default search action
38th DBSec 2024: San Jose, CA, USA
- Anna Lisa Ferrara, Ram Krishnan:
Data and Applications Security and Privacy XXXVIII - 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings. Lecture Notes in Computer Science 14901, Springer 2024, ISBN 978-3-031-65171-7
Access Control
- Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya:
A Graph-Based Framework for ABAC Policy Enforcement and Analysis. 3-23 - Giorgia Sirigu, Barbara Carminati, Elena Ferrari:
Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation. 24-43 - Alexander Puchta, Thomas Baumer, Mathis Müller, Günther Pernul:
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence. 44-52
Crypto Application
- Tieming Geng, Chin-Tser Huang:
SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. 55-70 - Md Shihabul Islam, Mahmoud Zamani, Kevin W. Hamlen, Latifur Khan, Murat Kantarcioglu:
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing. 71-91 - Yong Zhi Lim, Wen Qing Ong Perry, Jianying Zhou:
Towards Atomicity and Composability in Cross-Chain NFTs. 92-100 - Seyni Kane, Anis Bkakria:
A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. 101-108
Privacy
- Sabrina De Capitani di Vimercati, Sara Foresti, Valerio Ghirimoldi, Pierangela Samarati:
DT-Anon: Decision Tree Target-Driven Anonymization. 111-130 - Tassos Dimitriou:
Visor: Privacy-Preserving Reputation for Decentralized Marketplaces. 131-150
Attack
- Mahmoud Abdelgawad, Indrakshi Ray:
Resiliency Analysis of Mission-Critical System of Systems Using Formal Methods. 153-170 - Emmanuel Dana Buedi, Ali A. Ghorbani, Sajjad Dadkhah, Raphael Ferreira:
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024. 171-190 - Kéren Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Makhlouf Hadji:
Optimal Automated Generation of Playbooks. 191-199
ML Attack, Vulnerability
- Fariha Ishrat Rahman, Sadaf Md. Halim, Anoop Singhal, Latifur Khan:
ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. 203-220 - Saquib Irtiza, Xiaodi Li, Mahmoud Zamani, Latifur Khan, Kevin W. Hamlen:
VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning. 221-240 - Fatima Zahra Qachfar, Rakesh M. Verma:
All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset. 241-258 - Xiujuan Wang, Qipeng Li, Shuaibing Lu:
Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. 259-266
Security User Studies
- Sabrina Friedl, Tobias Reittinger, Günther Pernul:
From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. 269-289 - Arun Reddy, Yuan Cheng:
User Perceptions of CAPTCHAs: University vs. Internet Users. 290-297
Differential Privacy
- Saptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains. 301-319 - Fereshteh Razmi, Jian Lou, Li Xiong:
Does Differential Privacy Prevent Backdoor Attacks in Practice? 320-340
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.