Here is the list of accepted papers shown in no particular order. The F and S after the title means that the manuscript has been accepted as Full and Short paper, respectively.
- Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri and Jaideep Vaidya
Deciphering Text from Touchscreen Key Taps (F)
- Rauf Mahmudlu, Jerry Den Hartog and Nicola Zannone
Data Governance & Transparency for Collaborative Systems (F)
- Shlomi Dolev, Shantanu Sharma and Yin Li
Private and Secure Secret Shared MapReduce (S)
- Scott Stoller and Thang Bui
Mining Hierarchical Temporal Roles with Multiple Metrics (F)
- Luca Ferretti, Michele Colajanni and Mirco Marchetti
Guaranteeing correctness of bulk operations in outsourced databases (F)
- Daniele Sgandurra, Erisa Karafili and Emil Lupu
Formalizing Threat Models for Virtualized Systems (F)
- Jason Crampton and James Sellwood
Inter-ReBAC: Inter-operation of relationship-based access control model instances (S)
- Olgierd Pieczul and Simon Foley
Runtime detection of zero-day vulnerability exploits in contemporary software systems (F)
- Georg Merzdovnik, Klaus Falb, Martin Schmiedecker, Artemios Voyiatzis and Edgar Weippl
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services (F)
- Stefan Thaler, Jerry den Hartog and Milan Petkovic
Towards Creating HoneyProjects for Detecting Data Theft (S)
- Silvie Levy, Ehud Gudes and Nurit Gal-Oz
Sharing-habits based privacy control in social networks (F)
- Sjouke Mauw, Rolando Trujillo and Bochuan Xuan
Counteracting active attacks in social network graphs (F)
- Navid Pustchi and Ravi Sandhu
Role-Centric Circle of Trust in Multi-Tenant Cloud IaaS (F)
- Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
A Comparison of Logical-formula and Enumerated Authorization Policy ABAC Models (S)
- Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati
Access Control for the Shuffle Index (F)
- Harichandan Roy, Murat Kantarcioglu and Latanya Sweeney
Practical Differentially Private Modeling of Human Movement Data (S)
- Christof Ferreira Torres and Rolando Trujillo
The Fréchet/Manhattan distance and the trajectory anonymisation problem (F)
- Julien Bringer, Hervé Chabanne, Daniel Le Métayer and Roch Lescuyer
Reasoning about Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems (F)
- Ultan Neville and Simon Foley
Reasoning About Firewall Policies Through Refinement and Composition (F)
- Giovanni Di Crescenzo, Thimios Panagos and Brian Coan
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols (S)
- Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy and Brad Malin
CheapSMC: A Framework to Minimize SMC Cost in Cloud (S)
- Daniel Borbor, Lingyu Wang, Sushil Jajodia and Anoop Singhal
Diversifying Network Services under Cost Constraints for Better Resilience against Unknown Attacks (F)
- Fahad Shaon and Murat Kantarcioglu
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data (F)
- Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray and Michael Kahn
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes (F) |
|