E-Books durchsuchen

Data and Applications Security and Privacy XXX [2016]

1
Deciphering Text from Touchscreen Key Taps
2
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem
3
Guaranteeing Correctness of Bulk Operations in Outsourced Databases
4
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols
5
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes
6
Mining Hierarchical Temporal Roles with Multiple Metrics
7
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances
8
Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS
9
A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models
10
Access Control for the Shuffle Index
11
Private and Secure Secret Shared MapReduce (Extended Abstract)
12
Towards Creating Believable Decoy Project Folders for Detecting Data Theft
13
Practical Differentially Private Modeling of Human Movement Data
14
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
15
Data Governance and Transparency for Collaborative Systems
16
Sharing-Habits Based Privacy Control in Social Networks
17
Counteracting Active Attacks in Social Network Graphs
18
Formalizing Threat Models for Virtualized Systems
19
Reasoning About Firewall Policies Through Refinement and Composition
20
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud
21
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks
22
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems
23
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
24
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems
Feedback