Search - Data and Applications Security and Privacy XXX Access content directly

Filter your results

25 results
Contributor/author Internal identifier : 200187
Image document

Guaranteeing Correctness of Bulk Operations in Outsourced Databases

Luca Ferretti , Michele Colajanni , Mirco Marchetti
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.37-51, ⟨10.1007/978-3-319-41483-6_3⟩
Conference papers hal-01633666v1
Image document

Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems

Olgierd Pieczul , Simon N. Foley
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.347-363, ⟨10.1007/978-3-319-41483-6_24⟩
Conference papers hal-01633685v1
Image document

Private and Secure Secret Shared MapReduce (Extended Abstract)

Shlomi Dolev , Yin Li , Shantanu Sharma
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.151-160, ⟨10.1007/978-3-319-41483-6_11⟩
Conference papers hal-01633670v1
Image document

The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem

Christof Ferreira Torres , Rolando Trujillo-Rasua
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.19-34, ⟨10.1007/978-3-319-41483-6_2⟩
Conference papers hal-01633679v1
Image document

Reasoning About Firewall Policies Through Refinement and Composition

Ultan Neville , Simon N. Foley
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.268-284, ⟨10.1007/978-3-319-41483-6_19⟩
Conference papers hal-01633676v1
Image document

CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud

Erman Pattuk , Murat Kantarcioglu , Huseyin Ulusoy , Bradley Malin
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.285-294, ⟨10.1007/978-3-319-41483-6_20⟩
Conference papers hal-01633669v1
Image document

Sharing-Habits Based Privacy Control in Social Networks

Silvie Levy , Ehud Gudes , Nurit Gal-Oz
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.217-232, ⟨10.1007/978-3-319-41483-6_16⟩
Conference papers hal-01633684v1
Image document

Practical Differentially Private Modeling of Human Movement Data

Harichandan Roy , Murat Kantarcioglu , Latanya Sweeney
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.170-178, ⟨10.1007/978-3-319-41483-6_13⟩
Conference papers hal-01633671v1
Image document

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems

Julien Bringer , Hervé Chabanne , Daniel Le Métayer , Roch Lescuyer
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.313-327
Conference papers hal-01633672v1
Image document

Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

Jason Crampton , James Sellwood
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers hal-01633675v1
Image document

A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models

Prosunjit Biswas , Ravi Sandhu , Ram Krishnan
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.122-129, ⟨10.1007/978-3-319-41483-6_9⟩
Conference papers hal-01633664v1
Image document

A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data

Fahad Shaon , Murat Kantarcioglu
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.179-195, ⟨10.1007/978-3-319-41483-6_14⟩
Conference papers hal-01633678v1
Image document

Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes

Ibrahim Lazrig , Toan Ong , Indrajit Ray , Indrakshi Ray , Michael Kahn
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.61-76, ⟨10.1007/978-3-319-41483-6_5⟩
Conference papers hal-01633680v1
Image document

Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services

Georg Merzdovnik , Klaus Falb , Martin Schmiedecker , Artemios G. Voyiatzis , Edgar Weippl
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.331-346, ⟨10.1007/978-3-319-41483-6_23⟩
Conference papers hal-01633686v1
Image document

Mining Hierarchical Temporal Roles with Multiple Metrics

Scott D. Stoller , Thang Bui
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.79-95, ⟨10.1007/978-3-319-41483-6_6⟩
Conference papers hal-01633674v1

Data and Applications Security and Privacy XXX

Silvio Ranise , Vipin Swarup
Springer International Publishing, LNCS-9766, 2016, Lecture Notes in Computer Science, 978-3-319-41482-9. ⟨10.1007/978-3-319-41483-6⟩
Books hal-01633682v1
Image document

Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS

Navid Pustchi , Ravi Sandhu
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.106-121, ⟨10.1007/978-3-319-41483-6_8⟩
Conference papers hal-01633665v1
Image document

Data Governance and Transparency for Collaborative Systems

Rauf Mahmudlu , Jerry Den Hartog , Nicola Zannone
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.199-216, ⟨10.1007/978-3-319-41483-6_15⟩
Conference papers hal-01633673v1
Image document

Formalizing Threat Models for Virtualized Systems

Daniele Sgandurra , Erisa Karafili , Emil Lupu
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.251-267, ⟨10.1007/978-3-319-41483-6_18⟩
Conference papers hal-01633687v1
Image document

Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols

Giovanni Di Crescenzo , Euthimios Panagos , Brian Coan
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.52-60, ⟨10.1007/978-3-319-41483-6_4⟩
Conference papers hal-01633688v1
Image document

Counteracting Active Attacks in Social Network Graphs

Sjouke Mauw , Rolando Trujillo-Rasua , Bochuan Xuan
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.233-248, ⟨10.1007/978-3-319-41483-6_17⟩
Conference papers hal-01633668v1
Image document

Towards Creating Believable Decoy Project Folders for Detecting Data Theft

Stefan Thaler , Jerry Den Hartog , Milan Petkovic
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.161-169, ⟨10.1007/978-3-319-41483-6_12⟩
Conference papers hal-01633683v1
Image document

Access Control for the Shuffle Index

Sabrina de Capitani Di Vimercati , Sara Foresti , Stefano Paraboschi , Gerardo Pelosi , Pierangela Samarati
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.130-147, ⟨10.1007/978-3-319-41483-6_10⟩
Conference papers hal-01633667v1
Image document

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks

Daniel Borbor , Lingyu Wang , Sushil Jajodia , Anoop Singhal
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers hal-01633677v1
Image document

Deciphering Text from Touchscreen Key Taps

Haritabh Gupta , Shamik Sural , Vijayalakshmi Atluri , Jaideep Vaidya
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.3-18, ⟨10.1007/978-3-319-41483-6_1⟩
Conference papers hal-01633681v1