


default search action
31. DBSec 2017: Philadelphia, PA, USA
- Giovanni Livraga, Sencun Zhu:

Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings. Lecture Notes in Computer Science 10359, Springer 2017, ISBN 978-3-319-61175-4
Access Control
- Yossif Shalabi, Ehud Gudes:

Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases. 3-19 - Dieudonne Mulamba, Indrajit Ray:

Resilient Reference Monitor for Distributed Access Control via Moving Target Defense. 20-40 - Emre Uzun, Gennaro Parlato

, Vijayalakshmi Atluri
, Anna Lisa Ferrara, Jaideep Vaidya, Shamik Sural
, David Lorenzi:
Preventing Unauthorized Data Flows. 41-62 - Maanak Gupta, Farhan Patwa, Ravi S. Sandhu:

Object-Tagged RBAC Model for the Hadoop Ecosystem. 63-81 - Masoud Narouei, Hamed Khanpour, Hassan Takabi:

Identification of Access Control Policy Sentences from Natural Language Policy Documents. 82-100 - Thang Bui, Scott D. Stoller, Shikhar Sharma:

Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies. 101-119
Privacy
- Xiaosu Tong, Bowei Xi, Murat Kantarcioglu, Ali Inan:

Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy. 123-141 - Ling Chen, Ting Yu, Rada Chirkova:

Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition. 142-163 - Michael G. Solomon, Vaidy S. Sunderam, Li Xiong

, Ming Li:
Mutually Private Location Proximity Detection with Access Control. 164-184 - Jun Zhang, Meiqi He, Siu-Ming Yiu:

Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery. 185-204 - Theodore Georgiou, Amr El Abbadi, Xifeng Yan:

Privacy-Preserving Community-Aware Trending Topic Detection in Online Social Media. 205-224 - Jonas Böhler, Daniel Bernau, Florian Kerschbaum:

Privacy-Preserving Outlier Detection for Data Streams. 225-238 - Vishwas T. Patil, R. K. Shyamasundar:

Undoing of Privacy Policies on Facebook. 239-255
Cloud Security
- Xiaoyan Sun, Anoop Singhal, Peng Liu:

Towards Actionable Mission Impact Assessment in the Context of Cloud Computing. 259-274 - Jin Han, Wanyu Zang, Songqing Chen, Meng Yu:

Reducing Security Risks of Clouds Through Virtual Machine Placement. 275-292 - Nora Cuppens, Salaheddine Zerkane

, Yanhuang Li, David Espes
, Philippe Le Parc, Frédéric Cuppens:
Firewall Policies Provisioning Through SDN in the Cloud. 293-310 - Bo Zhang, Boxiang Dong

, Wendy Hui Wang:
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations. 311-324 - Florian Kerschbaum, Martin Härterich:

Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases. 325-336 - Tushar Kanti Saha

, Mayank, Takeshi Koshiba
:
Efficient Protocols for Private Database Queries. 337-348 - Anna Lisa Ferrara, Anna Cinzia Squicciarini

, Cong Liao, Truc L. Nguyen:
Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems. 349-361
Secure Storage in the Cloud
- Rouzbeh Behnia, Attila Altay Yavuz

, Muslum Ozgur Ozmen:
High-Speed High-Security Public Key Encryption with Keyword Search. 365-385 - Benny Fuhry

, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. 386-408 - Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade:

A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction. 409-429
Secure Systems
- Seth Simms, Margot Maxwell, Sara Johnson, Julian L. Rrushi:

Keylogger Detection Using a Decoy Keyboard. 433-452 - David Nuñez, Isaac Agudo, Javier López:

The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol. 453-472 - Tim Van hamme, Davy Preuveneers, Wouter Joosen:

Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers. 473-485
Security in Networks and Web
- Hao Xue, Fengjun Li

:
A Content-Aware Trust Index for Online Review Spam Detection. 489-508 - Daniel Borbor, Lingyu Wang, Sushil Jajodia

, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. 509-528 - Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:

A Distributed Mechanism to Protect Against DDoS Attacks. 529-540 - Zhaomo Yang, Kirill Levchenko:

Securing Web Applications with Predicate Access Control. 541-554

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














