𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Data and Applications Security and Privacy XXXII

✍ Scribed by Florian Kerschbaum, Stefano Paraboschi


Publisher
Springer International Publishing
Year
2018
Tongue
English
Leaves
349
Series
Lecture Notes in Computer Science 10980
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018.

The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems.


✦ Table of Contents


Front Matter ....Pages I-XI
Front Matter ....Pages 1-1
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds (Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal)....Pages 3-20
Blockchain-Based Auditing of Transparent Log Servers (Hoang-Long Nguyen, Jean-Philippe Eisenbarth, Claudia-Lavinia Ignat, Olivier Perrin)....Pages 21-37
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes (Edwin Bourget, FrΓ©dΓ©ric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon Foley, Youssef Laarouchi)....Pages 38-47
Front Matter ....Pages 49-49
Enabling the Deployment of ABAC Policies in RBAC Systems (Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural)....Pages 51-68
Policy Languages and Their Suitability for Trust Negotiation (Martin Kolar, Carmen Fernandez-Gago, Javier Lopez)....Pages 69-84
Role of Apps in Undoing of Privacy Policies on Facebook (Vishwas T. Patil, Nivia Jatain, R. K. Shyamasundar)....Pages 85-98
Towards Adaptive Access Control (Luciano Argento, Andrea Margheri, Federica Paci, Vladimiro Sassone, Nicola Zannone)....Pages 99-109
Front Matter ....Pages 111-111
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems (Thang Hoang, Attila A. Yavuz, F. BetΓΌl Durak, Jorge Guajardo)....Pages 113-130
Privacy-Preserving Planarity Testing of Distributed Graphs (Guy Barshap, Tamir Tassa)....Pages 131-147
Image Pixelization with Differential Privacy (Liyue Fan)....Pages 148-162
Front Matter ....Pages 163-163
Data Integrity Verification in Column-Oriented NoSQL Databases (Grisha Weintraub, Ehud Gudes)....Pages 165-181
A Novel Hybrid Password Authentication Scheme Based on Text and Image (Ian Mackie, Merve YΔ±ldΔ±rΔ±m)....Pages 182-197
β€œIt’s Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser (Majid Hatamian, Agnieszka Kitkowska, Jana Korunovska, Sabrina Kirrane)....Pages 198-215
Front Matter ....Pages 217-217
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies (B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar)....Pages 219-231
On Understanding Permission Usage Contextuality in Android Apps (Md Zakir Hossen, Mohammad Mannan)....Pages 232-242
Private yet Efficient Decision Tree Evaluation (Marc Joye, Fariborz Salehi)....Pages 243-259
Front Matter ....Pages 261-261
Breaking and Fixing the Security Proof of Garbled Bloom Filters (CΓ©dric Van Rompay, Melek Γ–nen)....Pages 263-277
USBlock: Blocking USB-Based Keypress Injection Attacks (Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl)....Pages 278-295
Front Matter ....Pages 297-297
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security (Jia Xu, Jianying Zhou)....Pages 299-311
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology (Amine Boukhtouta, Makan Pourzandi, Richard Brunner, StΓ©phane Dault)....Pages 312-329
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs (Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu)....Pages 330-348
Back Matter ....Pages 349-350

✦ Subjects


Computer Science; Systems and Data Security; Computers and Society; Legal Aspects of Computing; Information Systems Applications (incl.Internet); Data Encryption; Artificial Intelligence (incl. Robotics)


πŸ“œ SIMILAR VOLUMES


Security and Privacy for Big Data, Cloud
✍ Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa πŸ“‚ Library πŸ“… 2019 πŸ› The Institution of Engineering and Technology 🌐 English

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privac

Data Privacy and Security
✍ David Salomon (auth.) πŸ“‚ Library πŸ“… 2003 πŸ› Springer-Verlag New York 🌐 English

<p><P>Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the

Security, Privacy and Trust in Modern Da
✍ Milan Petkovic (Editor), Willem Jonker (Editor) πŸ“‚ Library πŸ“… 2007 🌐 English

The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, open interconnected systems are much more vulnerable to a

Practical Data Privacy: Enhancing Privac
✍ Katharine Jarmul πŸ“‚ Library πŸ“… 2023 πŸ› O'Reilly Media 🌐 English

<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under

Practical Data Privacy: Enhancing Privac
✍ Katharine Jarmul πŸ“‚ Library πŸ› O'Reilly Media 🌐 English

<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under

RFID: Applications, Security, and Privac
✍ Simson Garfinkel, Beth Rosenberg πŸ“‚ Library πŸ“… 2005 πŸ› Addison-Wesley Professional 🌐 English

<P><BLOCKQUOTE>β€œRFID is the first important technology of the twenty-first century. That’s an awesome responsibility. How can we know when and how RFID is being used? How can we make sure it is not misused? How can we exercise choice over how it affects us personally? How do we ensure it is safe? Th