Conference‎ > ‎

Accepted Papers

Here is the list of accepted papers shown in no particular order. The F and S after the title means that the manuscript has been accepted as Full and Short paper, respectively.

  • Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri and Jaideep Vaidya 
    Deciphering Text from Touchscreen Key Taps (F)

  • Rauf Mahmudlu, Jerry Den Hartog and Nicola Zannone 
    Data Governance & Transparency for Collaborative Systems (F)

  • Shlomi Dolev, Shantanu Sharma and Yin Li 
    Private and Secure Secret Shared MapReduce (S)

  • Scott Stoller and Thang Bui 
    Mining Hierarchical Temporal Roles with Multiple Metrics (F)

  • Luca Ferretti, Michele Colajanni and Mirco Marchetti 
    Guaranteeing correctness of bulk operations in outsourced databases (F)

  • Daniele Sgandurra, Erisa Karafili and Emil Lupu
    Formalizing Threat Models for Virtualized Systems (F)

  • Jason Crampton and James Sellwood
    Inter-ReBAC: Inter-operation of relationship-based access control model instances (S)

  • Olgierd Pieczul and Simon Foley
    Runtime detection of zero-day vulnerability exploits in contemporary software systems (F)

  • Georg Merzdovnik, Klaus Falb, Martin Schmiedecker, Artemios Voyiatzis and Edgar Weippl
    Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services (F)

  • Stefan Thaler, Jerry den Hartog and Milan Petkovic
    Towards Creating HoneyProjects for Detecting Data Theft (S)

  • Silvie Levy, Ehud Gudes and Nurit Gal-Oz
    Sharing-habits based privacy control in social networks (F)

  • Sjouke Mauw, Rolando Trujillo and Bochuan Xuan
    Counteracting active attacks in social network graphs (F)

  • Navid Pustchi and Ravi Sandhu
    Role-Centric Circle of Trust in Multi-Tenant Cloud IaaS (F)

  • Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
    A Comparison of Logical-formula and Enumerated Authorization Policy ABAC Models (S)

  • Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati
    Access Control for the Shuffle Index (F)

  • Harichandan Roy, Murat Kantarcioglu and Latanya Sweeney
    Practical Differentially Private Modeling of Human Movement Data (S)

  • Christof Ferreira Torres and Rolando Trujillo
    The Fréchet/Manhattan distance and the trajectory anonymisation problem (F)

  • Julien Bringer, Hervé Chabanne, Daniel Le Métayer and Roch Lescuyer
    Reasoning about Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems (F)

  • Ultan Neville and Simon Foley
    Reasoning About Firewall Policies Through Refinement and Composition (F)

  • Giovanni Di Crescenzo, Thimios Panagos and Brian Coan
    Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols (S)

  • Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy and Brad Malin
    CheapSMC: A Framework to Minimize SMC Cost in Cloud (S)

  • Daniel Borbor, Lingyu Wang, Sushil Jajodia and Anoop Singhal
    Diversifying Network Services under Cost Constraints for Better Resilience against Unknown Attacks (F)

  • Fahad Shaon and Murat Kantarcioglu
    A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data (F)

  • Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray and Michael Kahn
    Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes (F)