index - Data and Applications Security and Privacy XXXIV Access content directly

 

Table of Contents
 


Full Text Documents

Chargement de la page

Search

Chargement de la page

Data and Applications Security and Privacy XXXIV
Anoop Singhal, Jaideep Vaidya
Front Matter

Network and Cyber-Physical Systems Security


Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)
Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia
3-23
Managing Secure Inter-slice Communication in 5G Network Slice Chains
Luis Suarez, David Espes, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin, Philippe Le Parc
24-41
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes
Andy Dolan, Indrakshi Ray, Suryadipta Majumdar
42-63
Security Enumerations for Cyber-Physical Systems
Daniel Schlette, Florian Menges, Thomas Baumer, Günther Pernul
64-76

Information Flow and Access Control


Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered
Joachim Biskup
79-99
Network Functions Virtualization Access Control as a Service
Manel Smine, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens
100-117
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems
Marian Zaki, Adam Lee, Panos Chrysanthis
118-136
Information Flow Security Certification for SPARK Programs
Sandip Ghosal, R. Shyamasundar
137-150

Privacy-Preserving Computation


Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids
Marius Stübs, Tobias Mueller, Kai Bavendiek, Manuel Loesch, Sibylle Schupp, Hannes Federrath
153-173
Non-interactive Private Decision Tree Evaluation
Anselme Tueno, Yordan Boev, Florian Kerschbaum
174-194
Privacy-Preserving Anomaly Detection Using Synthetic Data
Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart
195-207
Local Differentially Private Matrix Factorization with MoG for Recommendations
Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Zhan Shu
208-220

Visualization and Analytics for Security


Designing a Decision-Support Visualization for Live Digital Forensic Investigations
Fabian Böhm, Ludwig Englbrecht, Günther Pernul
223-240
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud
Yoram Meijaard, Bram Cappers, Josh Mengerink, Nicola Zannone
241-260
PUA Detection Based on Bundle Installer Characteristics
Amir Lukach, Ehud Gudes, Asaf Shabtai
261-273
ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool
Andreas Schaad, Dominik Binder
274-285

Spatial Systems and Crowdsourcing Security


Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph Embedding
Sina Shaham, Gabriel Ghinita, Cyrus Shahabi
289-309
Crowdsourcing Under Data Poisoning Attacks: A Comparative Study
Farnaz Tahmasebian, Li Xiong, Mani Sotoodeh, Vaidy Sunderam
310-332
Self-enhancing GPS-Based Authentication Using Corresponding Address
Tran Thao, Mhd Irvan, Ryosuke Kobayashi, Rie Yamaguchi, Toshiyuki Nakata
333-344

Secure Outsourcing and Privacy


GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation
Radu Ciucanu, Pascal Lafourcade
346-366
SGX-IR: Secure Information Retrieval with Trusted Processors
Fahad Shaon, Murat Kantarcioglu
367-387
Readability of Privacy Policies
Barbara Krumay, Jennifer Klar
388-399

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/