


default search action
38th DBSec 2024: San Jose, CA, USA
- Anna Lisa Ferrara
, Ram Krishnan
:
Data and Applications Security and Privacy XXXVIII - 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings. Lecture Notes in Computer Science 14901, Springer 2024, ISBN 978-3-031-65171-7
Access Control
- Mian Yang
, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya:
A Graph-Based Framework for ABAC Policy Enforcement and Analysis. 3-23 - Giorgia Sirigu
, Barbara Carminati
, Elena Ferrari
:
Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation. 24-43 - Alexander Puchta
, Thomas Baumer
, Mathis Müller
, Günther Pernul
:
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence. 44-52
Crypto Application
- Tieming Geng, Chin-Tser Huang:
SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. 55-70 - Md Shihabul Islam
, Mahmoud Zamani
, Kevin W. Hamlen
, Latifur Khan
, Murat Kantarcioglu
:
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing. 71-91 - Yong Zhi Lim
, Wen Qing Ong Perry, Jianying Zhou:
Towards Atomicity and Composability in Cross-Chain NFTs. 92-100 - Seyni Kane, Anis Bkakria
:
A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. 101-108
Privacy
- Sabrina De Capitani di Vimercati
, Sara Foresti
, Valerio Ghirimoldi
, Pierangela Samarati
:
DT-Anon: Decision Tree Target-Driven Anonymization. 111-130 - Tassos Dimitriou:
Visor: Privacy-Preserving Reputation for Decentralized Marketplaces. 131-150
Attack
- Mahmoud Abdelgawad, Indrakshi Ray:
Resiliency Analysis of Mission-Critical System of Systems Using Formal Methods. 153-170 - Emmanuel Dana Buedi
, Ali A. Ghorbani
, Sajjad Dadkhah
, Raphael Ferreira:
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024. 171-190 - Kéren Saint-Hilaire
, Christopher Neal
, Frédéric Cuppens
, Nora Boulahia-Cuppens
, Makhlouf Hadji
:
Optimal Automated Generation of Playbooks. 191-199
ML Attack, Vulnerability
- Fariha Ishrat Rahman, Sadaf Md. Halim, Anoop Singhal, Latifur Khan:
ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. 203-220 - Saquib Irtiza
, Xiaodi Li
, Mahmoud Zamani
, Latifur Khan
, Kevin W. Hamlen
:
VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning. 221-240 - Fatima Zahra Qachfar
, Rakesh M. Verma:
All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset. 241-258 - Xiujuan Wang
, Qipeng Li, Shuaibing Lu
:
Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. 259-266
Security User Studies
- Sabrina Friedl
, Tobias Reittinger
, Günther Pernul
:
From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. 269-289 - Arun Reddy, Yuan Cheng
:
User Perceptions of CAPTCHAs: University vs. Internet Users. 290-297
Differential Privacy
- Saptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains. 301-319 - Fereshteh Razmi, Jian Lou, Li Xiong:
Does Differential Privacy Prevent Backdoor Attacks in Practice? 320-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.