Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

29 results
Image document

Creating Integrated Evidence Graphs for Network Forensics

Changwei Liu , Anoop Singhal , Duminda Wijesekera
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.227-241, ⟨10.1007/978-3-642-41148-9_16⟩
Conference papers hal-01460608v1
Image document

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Giovanni Livraga
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.314-329, ⟨10.1007/978-3-642-31540-4_24⟩
Conference papers hal-01534756v1
Image document

Identifying Evidence for Cloud Forensic Analysis

Changwei Liu , Anoop Singhal , Duminda Wijesekera
13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.111-130, ⟨10.1007/978-3-319-67208-3_7⟩
Conference papers hal-01716407v1
Image document

Distributed Query Evaluation over Encrypted Data

Sabrina de Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Giovanni Livraga , Stefano Paraboschi , et al.
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.96-114, ⟨10.1007/978-3-030-81242-3_6⟩
Conference papers hal-03677027v1
Image document

Evaluating WELI: A Wrist-Worn Application to Assist Young Adults with Neurodevelopmental Disorders in Inclusive Classes

Hui Zheng , Vivian Genaro Motti , Kudirat Giwa-Lawal , Anna Evmenova , Heidi Graff
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.114-134, ⟨10.1007/978-3-030-29384-0_7⟩
Conference papers hal-02544603v1
Image document

Consistent Query Plan Generation in Secure Cooperative Data Access

Meixing Le , Krishna Kant , Sushil Jajodia
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.227-242, ⟨10.1007/978-3-662-43936-4_15⟩
Conference papers hal-01284858v1
Image document

Reducing Security Risks of Clouds Through Virtual Machine Placement

Jin Han , Wanyu Zang , Songqing Chen , Meng Yu
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.275-292, ⟨10.1007/978-3-319-61176-1_15⟩
Conference papers hal-01684346v1
Image document

Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments

Changwei Liu , Anoop Singhal , Duminda Wijesekera
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.161-180, ⟨10.1007/978-3-030-56223-6_9⟩
Conference papers hal-03657230v1
Image document

A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS

Changwei Liu , Anoop Singhal , Duminda Wijesekera
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.129-145, ⟨10.1007/978-3-319-24123-4_8⟩
Conference papers hal-01449074v1
Image document

Cooperative Data Access in Multi-cloud Environments

Meixing Le , Krishna Kant , Sushil Jajodia
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.14-28, ⟨10.1007/978-3-642-22348-8_4⟩
Conference papers hal-01586583v1

Information Security Theory and Practice

Raja Naeem Akram , Sushil Jajodia
Raja Naeem Akram; Sushil Jajodia. Springer, LNCS-9311, 2015, Information Security Theory and Practice, 978-3-319-24017-6. ⟨10.1007/978-3-319-24018-3⟩
Books hal-01442559v1
Image document

Rule Enforcement with Third Parties in Secure Cooperative Data Access

Meixing Le , Krishna Kant , Sushil Jajodia
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.282-288, ⟨10.1007/978-3-642-39256-6_20⟩
Conference papers hal-01490712v1
Image document

Using parallel distributed processing to reduce the computational time of digital media similarity measures

Myeong Lim , James Jones
17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.65-87, ⟨10.1007/978-3-030-88381-2_4⟩
Conference papers hal-03764373v1
Image document

Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options

Daniel Borbor , Lingyu Wang , Sushil Jajodia , Anoop Singhal
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.509-528, ⟨10.1007/978-3-319-61176-1_28⟩
Conference papers hal-01684351v1
Image document

Determining the Forensic Data Requirements for Investigating Hypervisor Attacks

Changwei Liu , Anoop Singhal , Ramaswamy Chandramouli , Duminda Wijesekera
15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.253-272, ⟨10.1007/978-3-030-28752-8_14⟩
Conference papers hal-02534598v1
Image document

Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services

Murat Gunestas , Murad Mehmet , Duminda Wijesekera
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.133-150, ⟨10.1007/978-3-642-15506-2_10⟩
Conference papers hal-01060614v1
Image document

A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis

Changwei Liu , Anoop Singhal , Duminda Wijesekera
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.263-289, ⟨10.1007/978-3-319-99277-8_15⟩
Conference papers hal-01988841v1

Data and Applications Security and Privacy XXIV

Sara Foresti , Sushil Jajodia
Springer, LNCS-6166, 2010, Lecture Notes in Computer Science, 978-3-642-13738-9. ⟨10.1007/978-3-642-13739-6⟩
Books hal-01555409v1
Image document

TerraCheck: Verification of Dedicated Cloud Storage

Zhan Wang , Kun Sun , Sushil Jajodia , Jiwu Jing
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.113-127, ⟨10.1007/978-3-642-39256-6_8⟩
Conference papers hal-01490720v1
Image document

Extending Loose Associations to Multiple Fragments

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Giovanni Livraga , Stefano Paraboschi , et al.
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.1-16, ⟨10.1007/978-3-642-39256-6_1⟩
Conference papers hal-01490711v1
Image document

Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)

Nawaf Alhebaishi , Lingyu Wang , Sushil Jajodia
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.3-23, ⟨10.1007/978-3-030-49669-2_1⟩
Conference papers hal-03243631v1
Image document

Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds

Nawaf Alhebaishi , Lingyu Wang , Sushil Jajodia , Anoop Singhal
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers hal-01954402v1
Image document

A Probabilistic Network Forensic Model for Evidence Analysis

Changwei Liu , Anoop Singhal , Duminda Wijesekera
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.189-210, ⟨10.1007/978-3-319-46279-0_10⟩
Conference papers hal-01758685v1
Image document

Optimizing Integrity Checks for Join Queries in the Cloud

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.33-48, ⟨10.1007/978-3-662-43936-4_3⟩
Conference papers hal-01284840v1
Image document

Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks

Ekawat Homsirikamol , Paweł Morawiecki , Marcin Rogawski , Marian Srebrny
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers hal-01551728v1
Image document

CASFinder: Detecting Common Attack Surface

Mengyuan Zhang , Yue Xin , Lingyu Wang , Sushil Jajodia , Anoop Singhal
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers hal-02384581v1
Image document

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks

Daniel Borbor , Lingyu Wang , Sushil Jajodia , Anoop Singhal
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.295-312, ⟨10.1007/978-3-319-41483-6_21⟩
Conference papers hal-01633677v1
Image document

A Digital Media Similarity Measure for Triage of Digital Forensic Evidence

Myeong Lim , James Jones
16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.111-135, ⟨10.1007/978-3-030-56223-6_7⟩
Conference papers hal-03657240v1
Image document

Real-Time Covert Timing Channel Detection in Networked Virtual Environments

Anyi Liu , Jim Chen , Harry Wechsler
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.273-288, ⟨10.1007/978-3-642-41148-9_19⟩
Conference papers hal-01460611v1