researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
XML
XML Schema
access control
analysis
architecture
control systems
data-flow
database
design
e-science
meta-model
meta-objects
object-role modeling
role-based access control
rule-based
security
systematic-approach
workflow
Filter by Author
[+]
OR
AND
NOT
1
Anoop Singhal
Bhavani M. Thuraisingham
Ehud Gudes
Elisa Bertino
Frédéric Cuppens
Günther Pernul
Indrajit Ray
Indrakshi Ray
Jaideep Vaidya
Joachim Biskup
Martin S. Olivier
Pierangela Samarati
Ravi Mukkamala
Ravi S. Sandhu
Sabrina De Capitani di Vimercati
Steve Barker
Steven A. Demurjian
Sushil Jajodia
T. C. Ting
Vijayalakshmi Atluri
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
applications
control
data
database
databases
distributed
ifip
inference
model
multilevel
policies
privacy
role
secure
security
system
systems
using
DBSec (dbsec)
Editions
Publications
Viewing Publication 1 - 100 from 925
2023
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity
Basel Abdeen
,
Ehab Al-Shaer
,
Anoop Singhal
,
Latifur Khan
,
Kevin W. Hamlen
.
dbsec 2023
:
243-260
[doi]
Building Quadtrees for Spatial Data Under Local Differential Privacy
Ece Alptekin
,
Mehmet Emre Gursoy
.
dbsec 2023
:
22-39
[doi]
Control is Nothing Without Trust a First Look into Digital Identity Wallet Trends
Zahra Ebadi Ansaroudi
,
Roberto Carbone
,
Giada Sciarretta
,
Silvio Ranise
.
dbsec 2023
:
113-132
[doi]
(Local) Differential Privacy has NO Disparate Impact on Fairness
Héber Hwang Arcolezi
,
Karima Makhlouf
,
Catuscia Palamidessi
.
dbsec 2023
:
3-21
[doi]
On the Utility Gain of Iterative Bayesian Update for Locally Differentially Private Mechanisms
Héber Hwang Arcolezi
,
Selene Cerna
,
Catuscia Palamidessi
.
dbsec 2023
:
165-183
[doi]
Data and Applications Security and Privacy XXXVII - 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings
Vijayalakshmi Atluri
,
Anna Lisa Ferrara
, editors,
Volume 13942 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrapping
Adda-Akram Bendoukha
,
Pierre-Emmanuel Clet
,
Aymen Boudguiga
,
Renaud Sirdey
.
dbsec 2023
:
91-109
[doi]
Differentially Private Streaming Data Release Under Temporal Correlations via Post-processing
Xuyang Cao
,
Yang Cao 0011
,
Primal Pappachan
,
Atsuyoshi Nakamura
,
Masatoshi Yoshikawa
.
dbsec 2023
:
184-200
[doi]
2 Prediction
Marlon P. da Silva
,
Henry C. Nunes
,
Charles V. Neu
,
Luana T. Thomas
,
Avelino F. Zorzo
,
Charles Morisset
.
dbsec 2023
:
133-140
[doi]
AMOE: A Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit
Franz Deimling
,
Michela Fazzolari
.
dbsec 2023
:
369-385
[doi]
Data Distribution Impact on Preserving Privacy in Centralized and Decentralized Learning
Bakary Dolo
,
Faiza Loukil
,
Khouloud Boukadi
.
dbsec 2023
:
153-164
[doi]
Digital Twins for IoT Security Management
Philip Empl
,
Henric Hager
,
Günther Pernul
.
dbsec 2023
:
141-149
[doi]
A Dynamic Approach to Defuse Logic Bombs in Android Applications
Fausto Fasano
,
Michele Guerra
,
Roberto Milanese
,
Rocco Oliveto
.
dbsec 2023
:
358-365
[doi]
CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery
Tom Ganz
,
Erik Imgrund
,
Martin Härterich
,
Konrad Rieck
.
dbsec 2023
:
282-301
[doi]
Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach
Sascha Kern
,
Thomas Baumer
,
Ludwig Fuchs
,
Günther Pernul
.
dbsec 2023
:
223-242
[doi]
Classification Auto-Encoder Based Detector Against Diverse Data Poisoning Attacks
Fereshteh Razmi
,
Li Xiong 0001
.
dbsec 2023
:
263-281
[doi]
An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning
David Rodriguez
,
Ram Krishnan
.
dbsec 2023
:
302-316
[doi]
An Analysis of Hybrid Consensus in Blockchain Protocols for Correctness and Progress
Sangita Roy
,
Rudrapatna K. Shyamasundar
.
dbsec 2023
:
404-412
[doi]
New Results on Distributed Secret Sharing Protocols
Alfredo De Santis
,
Barbara Masucci
.
dbsec 2023
:
51-68
[doi]
Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments
Gianluca Sassetti
,
Amir Sharif
,
Giada Sciarretta
,
Roberto Carbone
,
Silvio Ranise
.
dbsec 2023
:
203-222
[doi]
Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin
Janaka Senanayake
,
Harsha K. Kalutarage
,
M. Omar Al-Kadri
,
Andrei Petrovski 0001
,
Luca Piras
.
dbsec 2023
:
339-357
[doi]
Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications
Aishwarya Surani
,
Amani Bawaked
,
Matthew Wheeler
,
Braden Kelsey
,
Nikki Roberts
,
David Vincent
,
Sanchari Das
.
dbsec 2023
:
319-338
[doi]
Privacy-Preserving Genomic Statistical Analysis Under Local Differential Privacy
Akito Yamamoto
,
Tetsuo Shibuya
.
dbsec 2023
:
40-48
[doi]
Probabilistic Fingerprinting Scheme for Correlated Data
Emre Yilmaz
,
Erman Ayday
.
dbsec 2023
:
69-90
[doi]
VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation
Siqi Zhang
,
Mengyuan Zhang
,
Lianying Zhao
.
dbsec 2023
:
386-403
[doi]
2022
Knowledge Mining in Cybersecurity: From Attack to Defense
Khandakar Ashrafi Akbar
,
Sadaf Md. Halim
,
Yibo Hu
,
Anoop Singhal
,
Latifur Khan
,
Bhavani Thuraisingham
.
dbsec 2022
:
110-122
[doi]
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors
Alexandros Bakas
,
Antonis Michalas
,
Eugene Frimpong
,
Reyhaneh Rabaninejad
.
dbsec 2022
:
279-299
[doi]
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies
Stefano Berlato
,
Umberto Morelli
,
Roberto Carbone
,
Silvio Ranise
.
dbsec 2022
:
236-255
[doi]
Assessing Differentially Private Variational Autoencoders Under Membership Inference
Daniel Bernau
,
Jonas Robl
,
Florian Kerschbaum
.
dbsec 2022
:
3-14
[doi]
Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption
Anis Bkakria
.
dbsec 2022
:
197-214
[doi]
ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases
Stanley Clark
,
Nikolay Yakovets
,
George Fletcher 0001
,
Nicola Zannone
.
dbsec 2022
:
303-315
[doi]
Verification and Validation Methods for a Trust-by-Design Framework for the IoT
Davide Ferraris
,
M. Carmen Fernández Gago
,
Javier López 0001
.
dbsec 2022
:
183-194
[doi]
Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection
Matt Gorbett
,
Hossein Shirazi
,
Indrakshi Ray
.
dbsec 2022
:
143-161
[doi]
Mitigating Privacy Vulnerability Caused by Map Asymmetry
Ryota Hiraishi
,
Masatoshi Yoshikawa
,
Shun Takagi
,
Yang Cao 0011
,
Sumio Fujita
,
Hidehito Gomi
.
dbsec 2022
:
68-86
[doi]
Utility and Privacy Assessment of Synthetic Microbiome Data
Markus Hittmeir
,
Rudolf Mayer
,
Andreas Ekelhart
.
dbsec 2022
:
15-27
[doi]
MCoM: A Semi-Supervised Method for Imbalanced Tabular Security Data
Xiaodi Li
,
Latifur Khan
,
Mahmoud Zamani
,
Shamila Wickramasuriya
,
Kevin W. Hamlen
,
Bhavani Thuraisingham
.
dbsec 2022
:
48-67
[doi]
Liberate Your Servers: A Decentralized Content Compliance Validation Protocol
Bowen Liu
,
Jianying Zhou 0001
.
dbsec 2022
:
89-109
[doi]
Combining Defences Against Data-Poisoning Based Backdoor Attacks on Neural Networks
Andrea Milakovic
,
Rudolf Mayer
.
dbsec 2022
:
28-47
[doi]
On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps
Shradha Neupane
,
Faiza Tazi
,
Upakar Paudel
,
Freddy Veloz Baez
,
Merzia Adamjee
,
Lorenzo De Carli
,
Sanchari Das
,
Indrakshi Ray
.
dbsec 2022
:
162-182
[doi]
Security Operations Center Roles and Skills: A Comparison of Theory and Practice
Andreas Reisser
,
Manfred Vielberth
,
Sofia Fohringer
,
Günther Pernul
.
dbsec 2022
:
316-327
[doi]
Data and Applications Security and Privacy XXXVI - 36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings
Shamik Sural
,
Haibing Lu
, editors,
Volume 13383 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Integrating and Evaluating Quantum-safe TLS in Database Applications
Anselme Tueno
,
David Boehm
,
Shin Ho Choe
.
dbsec 2022
:
259-278
[doi]
Attack-Resilient Blockchain-Based Decentralized Timed Data Release
Jingzhe Wang
,
Balaji Palanisamy
.
dbsec 2022
:
123-140
[doi]
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards
Jeroen Weener
,
Florian Hahn 0004
,
Andreas Peter
.
dbsec 2022
:
215-235
[doi]
2021
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed)
Jiafan Wang 0001
,
Sherman S. M. Chow
.
dbsec 2021
:
63-83
[doi]
Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings
Ken Barker 0001
,
Kambiz Ghazinour
, editors,
Volume 12840 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets
Mina Alishahi
,
Nicola Zannone
.
dbsec 2021
:
237-258
[doi]
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme
Alexandros Bakas
,
Antonis Michalas
.
dbsec 2021
:
84-95
[doi]
Comparing Local and Central Differential Privacy Using Membership Inference Attacks
Daniel Bernau
,
Jonas Robl
,
Philip-William Grassal
,
Steffen Schneider
,
Florian Kerschbaum
.
dbsec 2021
:
22-42
[doi]
On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining
Shuvra Chakraborty
,
Ravi S. Sandhu
.
dbsec 2021
:
393-405
[doi]
A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness
Ioannis Chrysakis
,
Giorgos Flouris
,
Maria Makridaki
,
Theodore Patkos
,
Yannis Roussakis
,
Georgios Samaritakis
,
Nikoleta Tsampanaki
,
Elias Tzortzakakis
,
Elisjana Ymeralli
,
Tom Seymoens
,
Anastasia Dimou
,
Ruben Verborgh
.
dbsec 2021
:
259-277
[doi]
Encrypted-Input Obfuscation of Image Classifiers
Giovanni Di Crescenzo
,
Lisa Bahler
,
Brian A. Coan
,
Kurt Rohloff
,
David Bruce Cousins
,
Yuriy Polyakov
.
dbsec 2021
:
136-156
[doi]
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments
Salimeh Dashti
,
Amir Sharif
,
Roberto Carbone
,
Silvio Ranise
.
dbsec 2021
:
325-337
[doi]
Distributed Query Evaluation over Encrypted Data
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Giovanni Livraga
,
Stefano Paraboschi
,
Pierangela Samarati
.
dbsec 2021
:
96-114
[doi]
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks
Sanaz Eidizadehakhcheloo
,
Bizhan Alipour Pijani
,
Abdessamad Imine
,
Michaël Rusinowitch
.
dbsec 2021
:
338-354
[doi]
The ${tkl}\hbox {-}\mathrm {Score}$ for Data-Sharing Misuseability
Kalvin Eng
,
Eleni Stroulia
.
dbsec 2021
:
312-324
[doi]
DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks
Liyue Fan
,
Akarsh Pokkunuru
.
dbsec 2021
:
3-21
[doi]
Verifiable Hierarchical Key Assignment Schemes
Anna Lisa Ferrara
,
Federica Paci
,
Chiara Ricciardi
.
dbsec 2021
:
357-376
[doi]
Access Control Policy Generation from User Stories Using Machine Learning
John Heaps
,
Ram Krishnan
,
Yufei Huang
,
Jianwei Niu 0001
,
Ravi S. Sandhu
.
dbsec 2021
:
171-188
[doi]
Preventing Manipulation Attack in Local Differential Privacy Using Verifiable Randomization Mechanism
Fumiyuki Kato
,
Yang Cao 0011
,
Masatoshi Yoshikawa
.
dbsec 2021
:
43-60
[doi]
Preserving Privacy of Co-occurring Keywords over Encrypted Data
D. V. N. Siva Kumar
,
P. Santhi Thilagam
.
dbsec 2021
:
157-168
[doi]
PDF Malware Detection Using Visualization and Machine Learning
Ching-Yuan Liu
,
Min-Yi Chiu
,
Qi-Xian Huang
,
Hung-Min Sun
.
dbsec 2021
:
209-220
[doi]
Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration Support
Wojciech Ozga
,
Do Le Quoc
,
Christof Fetzer
.
dbsec 2021
:
189-208
[doi]
Multi-party Private Set Operations with an External Decider
Sara Ramezanian
,
Tommi Meskanen
,
Valtteri Niemi
.
dbsec 2021
:
117-135
[doi]
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things
Na Shi
,
Bo Tang
,
Ravi S. Sandhu
,
Qi Li
.
dbsec 2021
:
278-290
[doi]
An ABAC Model with Trust and Gossiping (ABAC-TG) for Online Social Networks
Adi Swissa
,
Ehud Gudes
.
dbsec 2021
:
377-392
[doi]
A Digital Twin-Based Cyber Range for SOC Analysts
Manfred Vielberth
,
Magdalena Glas
,
Marietheres Dietz
,
Stylianos Karagiannis
,
Emmanouil Magkos
,
Günther Pernul
.
dbsec 2021
:
293-311
[doi]
Deep Learning for Detecting Network Attacks: An End-to-End Approach
Qingtian Zou
,
Anoop Singhal
,
Xiaoyan Sun 0003
,
Peng Liu
.
dbsec 2021
:
221-234
[doi]
2020
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)
Nawaf Alhebaishi
,
Lingyu Wang 0001
,
Sushil Jajodia
.
dbsec 2020
:
3-23
[doi]
Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered
Joachim Biskup
.
dbsec 2020
:
79-99
[doi]
Designing a Decision-Support Visualization for Live Digital Forensic Investigations
Fabian Böhm
,
Ludwig Englbrecht
,
Günther Pernul
.
dbsec 2020
:
223-240
[doi]
GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation
Radu Ciucanu
,
Pascal Lafourcade 0001
.
dbsec 2020
:
347-366
[doi]
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes
Andy Dolan
,
Indrakshi Ray
,
Suryadipta Majumdar
.
dbsec 2020
:
42-63
[doi]
Information Flow Security Certification for SPARK Programs
Sandip Ghosal
,
R. K. Shyamasundar
.
dbsec 2020
:
137-150
[doi]
Local Differentially Private Matrix Factorization with MoG for Recommendations
Neera Jeyamohan
,
Xiaomin Chen
,
Nauman Aslam
,
Zhan Shu
.
dbsec 2020
:
208-220
[doi]
Readability of Privacy Policies
Barbara Krumay
,
Jennifer Klar
.
dbsec 2020
:
388-399
[doi]
PUA Detection Based on Bundle Installer Characteristics
Amir Lukach
,
Ehud Gudes
,
Asaf Shabtai
.
dbsec 2020
:
261-273
[doi]
Privacy-Preserving Anomaly Detection Using Synthetic Data
Rudolf Mayer
,
Markus Hittmeir
,
Andreas Ekelhart
.
dbsec 2020
:
195-207
[doi]
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud
Yoram J. Meijaard
,
Bram C. M. Cappers
,
Josh G. M. Mengerink
,
Nicola Zannone
.
dbsec 2020
:
241-260
[doi]
ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool
Andreas Schaad
,
Dominik Binder
.
dbsec 2020
:
274-285
[doi]
Security Enumerations for Cyber-Physical Systems
Daniel Schlette
,
Florian Menges
,
Thomas Baumer
,
Günther Pernul
.
dbsec 2020
:
64-76
[doi]
Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph Embedding
Sina Shaham
,
Gabriel Ghinita
,
Cyrus Shahabi
.
dbsec 2020
:
289-309
[doi]
SGX-IR: Secure Information Retrieval with Trusted Processors
Fahad Shaon
,
Murat Kantarcioglu
.
dbsec 2020
:
367-387
[doi]
Data and Applications Security and Privacy XXXIV - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings
Anoop Singhal
,
Jaideep Vaidya
, editors,
Volume 12122 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
Network Functions Virtualization Access Control as a Service
Manel Smine
,
David Espes
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
.
dbsec 2020
:
100-117
[doi]
Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids
Marius Stübs
,
Tobias Mueller
,
Kai Bavendiek
,
Manuel Loesch
,
Sibylle Schupp
,
Hannes Federrath
.
dbsec 2020
:
153-173
[doi]
Managing Secure Inter-slice Communication in 5G Network Slice Chains
Luis A. Suárez
,
David Espes
,
Frédéric Cuppens
,
Cao-Thanh Phan
,
Philippe Bertin
,
Philippe Le Parc
.
dbsec 2020
:
24-41
[doi]
Crowdsourcing Under Data Poisoning Attacks: A Comparative Study
Farnaz Tahmasebian
,
Li Xiong 0001
,
Mani Sotoodeh
,
Vaidy S. Sunderam
.
dbsec 2020
:
310-332
[doi]
Self-enhancing GPS-Based Authentication Using Corresponding Address
Tran Phuong Thao
,
Mhd Irvan
,
Ryosuke Kobayashi
,
Rie Shigetomi Yamaguchi
,
Toshiyuki Nakata 0001
.
dbsec 2020
:
333-344
[doi]
Non-interactive Private Decision Tree Evaluation
Anselme Tueno
,
Yordan Boev
,
Florian Kerschbaum
.
dbsec 2020
:
174-194
[doi]
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems
Marian Zaki
,
Adam J. Lee
,
Panos K. Chrysanthis
.
dbsec 2020
:
118-136
[doi]
2019
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks
Mahmoud Abdelsalam
,
Ram Krishnan
,
Ravi Sandhu
.
dbsec 2019
:
381-397
[doi]
Wrangling in the Power of Code Pointers with ProxyCFI
Misiker Tadesse Aga
,
Colton Holoday
,
Todd M. Austin
.
dbsec 2019
:
317-337
[doi]
A Distributed Ledger Approach to Digital Twin Secure Data Sharing
Marietheres Dietz
,
Benedikt Putz
,
Günther Pernul
.
dbsec 2019
:
281-300
[doi]
Data and Applications Security and Privacy XXXIII - 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings
Simon N. Foley
, editor,
Volume 11559 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
Analysis of Privacy Policies to Enhance Informed Consent
Raúl Pardo
,
Daniel Le Métayer
.
dbsec 2019
:
177-198
[doi]
Contributing to Current Challenges in Identity and Access Management with Visual Analytics
Alexander Puchta
,
Fabian Böhm
,
Günther Pernul
.
dbsec 2019
:
221-239
[doi]
Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis
Mehrnoosh Shakarami
,
Ravi Sandhu
.
dbsec 2019
:
301-313
[doi]
Redirecting Malware's Target Selection with Decoy Processes
Sara Sutton
,
Garret Michilli
,
Julian L. Rrushi
.
dbsec 2019
:
398-417
[doi]
Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems
Cory Thoma
,
Alexandros Labrinidis
,
Adam J. Lee
.
dbsec 2019
:
261-280
[doi]
Sign in
or
sign up
to see more results.