Table of Contents
 


Full Text Documents

21

Search


Data and Applications Security and Privacy XXXIV
Anoop Singhal, Jaideep Vaidya
Front Matter

Network and Cyber-Physical Systems Security


Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)
Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia
3-23
Managing Secure Inter-slice Communication in 5G Network Slice Chains
Luis Suarez, David Espes, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin, Philippe Le Parc
24-41
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes
Andy Dolan, Indrakshi Ray, Suryadipta Majumdar
42-63
Security Enumerations for Cyber-Physical Systems
Daniel Schlette, Florian Menges, Thomas Baumer, Günther Pernul
64-76

Information Flow and Access Control


Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered
Joachim Biskup
79-99
Network Functions Virtualization Access Control as a Service
Manel Smine, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens
100-117
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems
Marian Zaki, Adam Lee, Panos Chrysanthis
118-136
Information Flow Security Certification for SPARK Programs
Sandip Ghosal, R. Shyamasundar
137-150

Privacy-Preserving Computation


Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids
Marius Stübs, Tobias Mueller, Kai Bavendiek, Manuel Loesch, Sibylle Schupp, Hannes Federrath
153-173
Non-interactive Private Decision Tree Evaluation
Anselme Tueno, Yordan Boev, Florian Kerschbaum
174-194
Privacy-Preserving Anomaly Detection Using Synthetic Data
Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart
195-207
Local Differentially Private Matrix Factorization with MoG for Recommendations
Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Zhan Shu
208-220

Visualization and Analytics for Security


Designing a Decision-Support Visualization for Live Digital Forensic Investigations
Fabian Böhm, Ludwig Englbrecht, Günther Pernul
223-240
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud
Yoram Meijaard, Bram Cappers, Josh Mengerink, Nicola Zannone
241-260
PUA Detection Based on Bundle Installer Characteristics
Amir Lukach, Ehud Gudes, Asaf Shabtai
261-273
ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool
Andreas Schaad, Dominik Binder
274-285

Spatial Systems and Crowdsourcing Security


Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph Embedding
Sina Shaham, Gabriel Ghinita, Cyrus Shahabi
289-309
Crowdsourcing Under Data Poisoning Attacks: A Comparative Study
Farnaz Tahmasebian, Li Xiong, Mani Sotoodeh, Vaidy Sunderam
310-332
Self-enhancing GPS-Based Authentication Using Corresponding Address
Tran Thao, Mhd Irvan, Ryosuke Kobayashi, Rie Yamaguchi, Toshiyuki Nakata
333-344

Secure Outsourcing and Privacy


GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation
Radu Ciucanu, Pascal Lafourcade
346-366
SGX-IR: Secure Information Retrieval with Trusted Processors
Fahad Shaon, Murat Kantarcioglu
367-387
Readability of Privacy Policies
Barbara Krumay, Jennifer Klar
388-399

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/