Table of Contents
|
Data and Applications Security and Privacy XXX Silvio Ranise, Vipin Swarup |
Front Matter |
Mobile Security and Privacy
|
Deciphering Text from Touchscreen Key Taps Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
3-18 |
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem Christof Torres, Rolando Trujillo-Rasua |
19-34 |
Security and Privacy in Databases
|
Guaranteeing Correctness of Bulk Operations in Outsourced Databases Luca Ferretti, Michele Colajanni, Mirco Marchetti |
37-51 |
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols Giovanni Crescenzo, Euthimios Panagos, Brian Coan |
52-60 |
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael Kahn |
61-76 |
Access Control
|
Mining Hierarchical Temporal Roles with Multiple Metrics Scott Stoller, Thang Bui |
79-95 |
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances Jason Crampton, James Sellwood |
96-105 |
Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS Navid Pustchi, Ravi Sandhu |
106-121 |
A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models Prosunjit Biswas, Ravi Sandhu, Ram Krishnan |
122-129 |
Access Control for the Shuffle Index Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
130-147 |
Protection and Privacy of Data and Big Data
|
Private and Secure Secret Shared MapReduce (Extended Abstract) Shlomi Dolev, Yin Li, Shantanu Sharma |
151-160 |
Towards Creating Believable Decoy Project Folders for Detecting Data Theft Stefan Thaler, Jerry Hartog, Milan Petkovic |
161-169 |
Practical Differentially Private Modeling of Human Movement Data Harichandan Roy, Murat Kantarcioglu, Latanya Sweeney |
170-178 |
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data Fahad Shaon, Murat Kantarcioglu |
179-195 |
Security and Privacy in Social Networks and Collaborative Systems
|
Data Governance and Transparency for Collaborative Systems Rauf Mahmudlu, Jerry Hartog, Nicola Zannone |
199-216 |
Sharing-Habits Based Privacy Control in Social Networks Silvie Levy, Ehud Gudes, Nurit Gal-Oz |
217-232 |
Counteracting Active Attacks in Social Network Graphs Sjouke Mauw, Rolando Trujillo-Rasua, Bochuan Xuan |
233-248 |
Reasoning about Security and its Cost
|
Formalizing Threat Models for Virtualized Systems Daniele Sgandurra, Erisa Karafili, Emil Lupu |
251-267 |
Reasoning About Firewall Policies Through Refinement and Composition Ultan Neville, Simon Foley |
268-284 |
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy, Bradley Malin |
285-294 |
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal |
295-312 |
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems Julien Bringer, Hervé Chabanne, Daniel Métayer, Roch Lescuyer |
313-327 |
Trust and Zero-Day Vulnerabilities
|
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services Georg Merzdovnik, Klaus Falb, Martin Schmiedecker, Artemios Voyiatzis, Edgar Weippl |
331-346 |
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems Olgierd Pieczul, Simon Foley |
347-363 |