Full Text Documents

Search


Table of Contents
Data and Applications Security and Privacy XXXII
Florian Kerschbaum, Stefano Paraboschi
Front Matter

Administration


Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds
Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal
3-20
Blockchain-Based Auditing of Transparent Log Servers
Hoang-Long Nguyen, Jean-Philippe Eisenbarth, Claudia-Lavinia Ignat, Olivier Perrin
21-37
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes
Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon Foley, Youssef Laarouchi
38-47

Access Control Policies


Enabling the Deployment of ABAC Policies in RBAC Systems
Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
51-68
Policy Languages and Their Suitability for Trust Negotiation
Martin Kolar, Carmen Fernandez-Gago, Javier Lopez
69-84
Role of Apps in Undoing of Privacy Policies on Facebook
Vishwas Patil, Nivia Jatain, R. Shyamasundar
85-98
Towards Adaptive Access Control
Luciano Argento, Andrea Margheri, Federica Paci, Vladimiro Sassone, Nicola Zannone
99-109

Privacy-Preserving Access and Computation


Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems
Thang Hoang, Attila Yavuz, F. Durak, Jorge Guajardo
113-130
Privacy-Preserving Planarity Testing of Distributed Graphs
Guy Barshap, Tamir Tassa
131-147
Image Pixelization with Differential Privacy
Liyue Fan
148-162

Integrity and User Interaction


Data Integrity Verification in Column-Oriented NoSQL Databases
Grisha Weintraub, Ehud Gudes
165-181
A Novel Hybrid Password Authentication Scheme Based on Text and Image
Ian Mackie, Merve Yıldırım
182-197
“It’s Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser
Majid Hatamian, Agnieszka Kitkowska, Jana Korunovska, Sabrina Kirrane
198-215

Security Analysis and Private Evaluation


FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies
B. Radhika, N. Narendra Kumar, R. Shyamasundar
219-231
On Understanding Permission Usage Contextuality in Android Apps
Md Hossen, Mohammad Mannan
232-242
Private yet Efficient Decision Tree Evaluation
Marc Joye, Fariborz Salehi
243-259

Fixing Vulnerabilities


Breaking and Fixing the Security Proof of Garbled Bloom Filters
Cédric Rompay, Melek Önen
263-277
USBlock: Blocking USB-Based Keypress Injection Attacks
Sebastian Neuner, Artemios Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar Weippl
278-295

Networked Systems


Virtually Isolated Network: A Hybrid Network to Achieve High Level Security
Jia Xu, Jianying Zhou
299-311
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology
Amine Boukhtouta, Makan Pourzandi, Richard Brunner, Stéphane Dault
312-329
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs
Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu
330-348

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/