index - Data and Applications Security and Privacy XXXV Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Data and Applications Security and Privacy XXXV
Ken Barker, Kambiz Ghazinour
Front Matter

Differential Privacy


DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks
Liyue Fan, Akarsh Pokkunuru
3-21
Comparing Local and Central Differential Privacy Using Membership Inference Attacks
Daniel Bernau, Jonas Robl, Philip Grassal, Steffen Schneider, Florian Kerschbaum
22-42
Preventing Manipulation Attack in Local Differential Privacy Using Verifiable Randomization Mechanism
Fumiyuki Kato, Yang Cao, Masatoshi Yoshikawa
43-60

Cryptology I


Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps
Jiafan Wang, Sherman Chow
63-83
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme
Alexandros Bakas, Antonis Michalas
84-95
Distributed Query Evaluation over Encrypted Data
Sabrina de Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
96-114

Cryptology II


Multi-party Private Set Operations with an External Decider
Sara Ramezanian, Tommi Meskanen, Valtteri Niemi
117-135
Encrypted-Input Obfuscation of Image Classifiers
Giovanni Crescenzo, Lisa Bahler, Brian Coan, Kurt Rohloff, David Cousins, Yuriy Polyakov
136-156
Preserving Privacy of Co-occurring Keywords over Encrypted Data
D. Siva Kumar, P. Santhi Thilagam
157-168

Machine Learning


Access Control Policy Generation from User Stories Using Machine Learning
John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu, Ravi Sandhu
171-188
Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration Support
Wojciech Ozga, Do Quoc, Christof Fetzer
189-208
PDF Malware Detection Using Visualization and Machine Learning
Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang, Hung-Min Sun
209-220
Deep Learning for Detecting Network Attacks: An End-to-End Approach
Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
221-234

Potpourri I


Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets
Mina Alishahi, Nicola Zannone
237-258
A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness
Ioannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsampanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou, Ruben Verborgh
259-277
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things
Na Shi, Bo Tang, Ravi Sandhu, Qi Li
278-290

Potpourri II


A Digital Twin-Based Cyber Range for SOC Analysts
Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos, Günther Pernul
293-311
The $${tkl}\hbox {-}\mathrm {Score}$$tkl-Score for Data-Sharing Misuseability
Kalvin Eng, Eleni Stroulia
312-324
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments
Salimeh Dashti, Amir Sharif, Roberto Carbone, Silvio Ranise
325-337
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks
Sanaz Eidizadehakhcheloo, Bizhan Pijani, Abdessamad Imine, Michaël Rusinowitch
338-356

Access Control


Verifiable Hierarchical Key Assignment Schemes
Anna Ferrara, Federica Paci, Chiara Ricciardi
357-376
An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks
Adi Swissa, Ehud Gudes
377-392
On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining
Shuvra Chakraborty, Ravi Sandhu
393-405

 


Designed by Inria-IES Team : http://ifip.hal.science/    Hosted by HAL : http://hal.archives-ouvertes.fr/