As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privac
Data and Applications Security and Privacy XXXII
β Scribed by Florian Kerschbaum, Stefano Paraboschi
- Publisher
- Springer International Publishing
- Year
- 2018
- Tongue
- English
- Leaves
- 349
- Series
- Lecture Notes in Computer Science 10980
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018.
The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems.
β¦ Table of Contents
Front Matter ....Pages I-XI
Front Matter ....Pages 1-1
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds (Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal)....Pages 3-20
Blockchain-Based Auditing of Transparent Log Servers (Hoang-Long Nguyen, Jean-Philippe Eisenbarth, Claudia-Lavinia Ignat, Olivier Perrin)....Pages 21-37
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes (Edwin Bourget, FrΓ©dΓ©ric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon Foley, Youssef Laarouchi)....Pages 38-47
Front Matter ....Pages 49-49
Enabling the Deployment of ABAC Policies in RBAC Systems (Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural)....Pages 51-68
Policy Languages and Their Suitability for Trust Negotiation (Martin Kolar, Carmen Fernandez-Gago, Javier Lopez)....Pages 69-84
Role of Apps in Undoing of Privacy Policies on Facebook (Vishwas T. Patil, Nivia Jatain, R. K. Shyamasundar)....Pages 85-98
Towards Adaptive Access Control (Luciano Argento, Andrea Margheri, Federica Paci, Vladimiro Sassone, Nicola Zannone)....Pages 99-109
Front Matter ....Pages 111-111
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems (Thang Hoang, Attila A. Yavuz, F. BetΓΌl Durak, Jorge Guajardo)....Pages 113-130
Privacy-Preserving Planarity Testing of Distributed Graphs (Guy Barshap, Tamir Tassa)....Pages 131-147
Image Pixelization with Differential Privacy (Liyue Fan)....Pages 148-162
Front Matter ....Pages 163-163
Data Integrity Verification in Column-Oriented NoSQL Databases (Grisha Weintraub, Ehud Gudes)....Pages 165-181
A Novel Hybrid Password Authentication Scheme Based on Text and Image (Ian Mackie, Merve YΔ±ldΔ±rΔ±m)....Pages 182-197
βItβs Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser (Majid Hatamian, Agnieszka Kitkowska, Jana Korunovska, Sabrina Kirrane)....Pages 198-215
Front Matter ....Pages 217-217
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies (B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar)....Pages 219-231
On Understanding Permission Usage Contextuality in Android Apps (Md Zakir Hossen, Mohammad Mannan)....Pages 232-242
Private yet Efficient Decision Tree Evaluation (Marc Joye, Fariborz Salehi)....Pages 243-259
Front Matter ....Pages 261-261
Breaking and Fixing the Security Proof of Garbled Bloom Filters (CΓ©dric Van Rompay, Melek Γnen)....Pages 263-277
USBlock: Blocking USB-Based Keypress Injection Attacks (Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl)....Pages 278-295
Front Matter ....Pages 297-297
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security (Jia Xu, Jianying Zhou)....Pages 299-311
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology (Amine Boukhtouta, Makan Pourzandi, Richard Brunner, StΓ©phane Dault)....Pages 312-329
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs (Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu)....Pages 330-348
Back Matter ....Pages 349-350
β¦ Subjects
Computer Science; Systems and Data Security; Computers and Society; Legal Aspects of Computing; Information Systems Applications (incl.Internet); Data Encryption; Artificial Intelligence (incl. Robotics)
π SIMILAR VOLUMES
<p><P>Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, open interconnected systems are much more vulnerable to a
<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under
<p><span>Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental under
<P><BLOCKQUOTE>βRFID is the first important technology of the twenty-first century. Thatβs an awesome responsibility. How can we know when and how RFID is being used? How can we make sure it is not misused? How can we exercise choice over how it affects us personally? How do we ensure it is safe? Th