researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
XML
XML Schema
access control
analysis
architecture
control systems
data-flow
database
design
e-science
meta-model
meta-objects
object-role modeling
role-based access control
rule-based
security
systematic-approach
workflow
Filter by Author
[+]
OR
AND
NOT
1
Bhavani M. Thuraisingham
Ehud Gudes
Elisa Bertino
Frédéric Cuppens
Günther Pernul
Indrajit Ray
Indrakshi Ray
Jaideep Vaidya
Joachim Biskup
Martin S. Olivier
Pierangela Samarati
Ravi Mukkamala
Ravi S. Sandhu
Sabrina De Capitani di Vimercati
Steve Barker
Steven A. Demurjian
Sujeet Shenoi
Sushil Jajodia
T. C. Ting
Vijayalakshmi Atluri
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
control
data
database
databases
distributed
ifip
inference
information
model
multilevel
policies
privacy
role
secure
security
system
systems
using
DBSec (dbsec)
Editions
Publications
Viewing Publication 1 - 100 from 881
2021
Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings
Ken Barker 0001
,
Kambiz Ghazinour
, editors,
Volume 12840 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed)
Jiafan Wang 0001
,
Sherman S. M. Chow
.
dbsec 2021
:
63-83
[doi]
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets
Mina Alishahi
,
Nicola Zannone
.
dbsec 2021
:
237-258
[doi]
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme
Alexandros Bakas
,
Antonis Michalas
.
dbsec 2021
:
84-95
[doi]
Comparing Local and Central Differential Privacy Using Membership Inference Attacks
Daniel Bernau
,
Jonas Robl
,
Philip-William Grassal
,
Steffen Schneider
,
Florian Kerschbaum
.
dbsec 2021
:
22-42
[doi]
On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining
Shuvra Chakraborty
,
Ravi S. Sandhu
.
dbsec 2021
:
393-405
[doi]
A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness
Ioannis Chrysakis
,
Giorgos Flouris
,
Maria Makridaki
,
Theodore Patkos
,
Yannis Roussakis
,
Georgios Samaritakis
,
Nikoleta Tsampanaki
,
Elias Tzortzakakis
,
Elisjana Ymeralli
,
Tom Seymoens
,
Anastasia Dimou
,
Ruben Verborgh
.
dbsec 2021
:
259-277
[doi]
Encrypted-Input Obfuscation of Image Classifiers
Giovanni Di Crescenzo
,
Lisa Bahler
,
Brian A. Coan
,
Kurt Rohloff
,
David Bruce Cousins
,
Yuriy Polyakov
.
dbsec 2021
:
136-156
[doi]
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments
Salimeh Dashti
,
Amir Sharif
,
Roberto Carbone
,
Silvio Ranise
.
dbsec 2021
:
325-337
[doi]
Distributed Query Evaluation over Encrypted Data
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Giovanni Livraga
,
Stefano Paraboschi
,
Pierangela Samarati
.
dbsec 2021
:
96-114
[doi]
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks
Sanaz Eidizadehakhcheloo
,
Bizhan Alipour Pijani
,
Abdessamad Imine
,
Michaël Rusinowitch
.
dbsec 2021
:
338-354
[doi]
The ${tkl}\hbox {-}\mathrm {Score}$ for Data-Sharing Misuseability
Kalvin Eng
,
Eleni Stroulia
.
dbsec 2021
:
312-324
[doi]
DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks
Liyue Fan
,
Akarsh Pokkunuru
.
dbsec 2021
:
3-21
[doi]
Verifiable Hierarchical Key Assignment Schemes
Anna Lisa Ferrara
,
Federica Paci
,
Chiara Ricciardi
.
dbsec 2021
:
357-376
[doi]
Access Control Policy Generation from User Stories Using Machine Learning
John Heaps
,
Ram Krishnan
,
Yufei Huang
,
Jianwei Niu 0001
,
Ravi S. Sandhu
.
dbsec 2021
:
171-188
[doi]
Preventing Manipulation Attack in Local Differential Privacy Using Verifiable Randomization Mechanism
Fumiyuki Kato
,
Yang Cao 0011
,
Masatoshi Yoshikawa
.
dbsec 2021
:
43-60
[doi]
Preserving Privacy of Co-occurring Keywords over Encrypted Data
D. V. N. Siva Kumar
,
P. Santhi Thilagam
.
dbsec 2021
:
157-168
[doi]
PDF Malware Detection Using Visualization and Machine Learning
Ching-Yuan Liu
,
Min-Yi Chiu
,
Qi-Xian Huang
,
Hung-Min Sun
.
dbsec 2021
:
209-220
[doi]
Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration Support
Wojciech Ozga
,
Do Le Quoc
,
Christof Fetzer
.
dbsec 2021
:
189-208
[doi]
Multi-party Private Set Operations with an External Decider
Sara Ramezanian
,
Tommi Meskanen
,
Valtteri Niemi
.
dbsec 2021
:
117-135
[doi]
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things
Na Shi
,
Bo Tang
,
Ravi S. Sandhu
,
Qi Li
.
dbsec 2021
:
278-290
[doi]
An ABAC Model with Trust and Gossiping (ABAC-TG) for Online Social Networks
Adi Swissa
,
Ehud Gudes
.
dbsec 2021
:
377-392
[doi]
A Digital Twin-Based Cyber Range for SOC Analysts
Manfred Vielberth
,
Magdalena Glas
,
Marietheres Dietz
,
Stylianos Karagiannis
,
Emmanouil Magkos
,
Günther Pernul
.
dbsec 2021
:
293-311
[doi]
Deep Learning for Detecting Network Attacks: An End-to-End Approach
Qingtian Zou
,
Anoop Singhal
,
Xiaoyan Sun 0003
,
Peng Liu
.
dbsec 2021
:
221-234
[doi]
2020
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)
Nawaf Alhebaishi
,
Lingyu Wang 0001
,
Sushil Jajodia
.
dbsec 2020
:
3-23
[doi]
Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered
Joachim Biskup
.
dbsec 2020
:
79-99
[doi]
Designing a Decision-Support Visualization for Live Digital Forensic Investigations
Fabian Böhm
,
Ludwig Englbrecht
,
Günther Pernul
.
dbsec 2020
:
223-240
[doi]
GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation
Radu Ciucanu
,
Pascal Lafourcade 0001
.
dbsec 2020
:
347-366
[doi]
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes
Andy Dolan
,
Indrakshi Ray
,
Suryadipta Majumdar
.
dbsec 2020
:
42-63
[doi]
Information Flow Security Certification for SPARK Programs
Sandip Ghosal
,
R. K. Shyamasundar
.
dbsec 2020
:
137-150
[doi]
Local Differentially Private Matrix Factorization with MoG for Recommendations
Neera Jeyamohan
,
Xiaomin Chen
,
Nauman Aslam
,
Zhan Shu
.
dbsec 2020
:
208-220
[doi]
Readability of Privacy Policies
Barbara Krumay
,
Jennifer Klar
.
dbsec 2020
:
388-399
[doi]
PUA Detection Based on Bundle Installer Characteristics
Amir Lukach
,
Ehud Gudes
,
Asaf Shabtai
.
dbsec 2020
:
261-273
[doi]
Privacy-Preserving Anomaly Detection Using Synthetic Data
Rudolf Mayer
,
Markus Hittmeir
,
Andreas Ekelhart
.
dbsec 2020
:
195-207
[doi]
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud
Yoram J. Meijaard
,
Bram C. M. Cappers
,
Josh G. M. Mengerink
,
Nicola Zannone
.
dbsec 2020
:
241-260
[doi]
ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool
Andreas Schaad
,
Dominik Binder
.
dbsec 2020
:
274-285
[doi]
Security Enumerations for Cyber-Physical Systems
Daniel Schlette
,
Florian Menges
,
Thomas Baumer
,
Günther Pernul
.
dbsec 2020
:
64-76
[doi]
Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph Embedding
Sina Shaham
,
Gabriel Ghinita
,
Cyrus Shahabi
.
dbsec 2020
:
289-309
[doi]
SGX-IR: Secure Information Retrieval with Trusted Processors
Fahad Shaon
,
Murat Kantarcioglu
.
dbsec 2020
:
367-387
[doi]
Data and Applications Security and Privacy XXXIV - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings
Anoop Singhal
,
Jaideep Vaidya
, editors,
Volume 12122 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
Network Functions Virtualization Access Control as a Service
Manel Smine
,
David Espes
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
.
dbsec 2020
:
100-117
[doi]
Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids
Marius Stübs
,
Tobias Mueller
,
Kai Bavendiek
,
Manuel Loesch
,
Sibylle Schupp
,
Hannes Federrath
.
dbsec 2020
:
153-173
[doi]
Managing Secure Inter-slice Communication in 5G Network Slice Chains
Luis A. Suárez
,
David Espes
,
Frédéric Cuppens
,
Cao-Thanh Phan
,
Philippe Bertin
,
Philippe Le Parc
.
dbsec 2020
:
24-41
[doi]
Crowdsourcing Under Data Poisoning Attacks: A Comparative Study
Farnaz Tahmasebian
,
Li Xiong 0001
,
Mani Sotoodeh
,
Vaidy S. Sunderam
.
dbsec 2020
:
310-332
[doi]
Self-enhancing GPS-Based Authentication Using Corresponding Address
Tran Phuong Thao
,
Mhd Irvan
,
Ryosuke Kobayashi
,
Rie Shigetomi Yamaguchi
,
Toshiyuki Nakata 0001
.
dbsec 2020
:
333-344
[doi]
Non-interactive Private Decision Tree Evaluation
Anselme Tueno
,
Yordan Boev
,
Florian Kerschbaum
.
dbsec 2020
:
174-194
[doi]
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems
Marian Zaki
,
Adam J. Lee
,
Panos K. Chrysanthis
.
dbsec 2020
:
118-136
[doi]
2019
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks
Mahmoud Abdelsalam
,
Ram Krishnan
,
Ravi Sandhu
.
dbsec 2019
:
381-397
[doi]
Wrangling in the Power of Code Pointers with ProxyCFI
Misiker Tadesse Aga
,
Colton Holoday
,
Todd M. Austin
.
dbsec 2019
:
317-337
[doi]
Detecting Adversarial Attacks in the Context of Bayesian Networks
Emad Alsuwat
,
Hatim Alsuwat
,
John Rose
,
Marco Valtorta
,
Csilla Farkas
.
dbsec 2019
:
3-22
[doi]
"When and Where Do You Want to Hide?" - Recommendation of Location Privacy Preferences with Local Differential Privacy
Maho Asada
,
Masatoshi Yoshikawa
,
Yang Cao 0011
.
dbsec 2019
:
164-176
[doi]
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement
Bruhadeshwar Bezawada
,
Indrajit Ray
,
Kushagra Tiwary
.
dbsec 2019
:
23-42
[doi]
Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps
Davide Caputo
,
Luca Verderame
,
Simone Aonzo
,
Alessio Merlo
.
dbsec 2019
:
121-139
[doi]
A Distributed Ledger Approach to Digital Twin Secure Data Sharing
Marietheres Dietz
,
Benedikt Putz
,
Günther Pernul
.
dbsec 2019
:
281-300
[doi]
Data and Applications Security and Privacy XXXIII - 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings
Simon N. Foley
, editor,
Volume 11559 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
On Practical Aspects of PCFG Password Cracking
Radek Hranický
,
Filip Listiak
,
Dávid Mikus
,
Ondrej Rysavý
.
dbsec 2019
:
43-60
[doi]
That's My DNA: Detecting Malicious Tampering of Synthesized DNA
Diptendu Mohan Kar
,
Indrajit Ray
.
dbsec 2019
:
61-80
[doi]
Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping
Jacob Leon Kröger
,
Philip Raschke
.
dbsec 2019
:
102-120
[doi]
Analysis of Multi-path Onion Routing-Based Anonymization Networks
Wladimir De la Cadena
,
Daniel Kaiser
,
Asya Mitseva
,
Andriy Panchenko 0001
,
Thomas Engel 0001
.
dbsec 2019
:
240-258
[doi]
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations
Salvatore Manfredi
,
Silvio Ranise
,
Giada Sciarretta
.
dbsec 2019
:
201-220
[doi]
Analysis of Privacy Policies to Enhance Informed Consent
Raúl Pardo
,
Daniel Le Métayer
.
dbsec 2019
:
177-198
[doi]
Contributing to Current Challenges in Identity and Access Management with Visual Analytics
Alexander Puchta
,
Fabian Böhm
,
Günther Pernul
.
dbsec 2019
:
221-239
[doi]
Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis
Mehrnoosh Shakarami
,
Ravi Sandhu
.
dbsec 2019
:
301-313
[doi]
Adversarial Sampling Attacks Against Phishing Detection
Hossein Shirazi
,
Bruhadeshwar Bezawada
,
Indrakshi Ray
,
Charles Anderson
.
dbsec 2019
:
83-101
[doi]
Algorithm Diversity for Resilient Systems
Scott D. Stoller
,
Yanhong A. Liu
.
dbsec 2019
:
359-378
[doi]
Redirecting Malware's Target Selection with Decoy Processes
Sara Sutton
,
Garret Michilli
,
Julian L. Rrushi
.
dbsec 2019
:
398-417
[doi]
Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks
Shun Takagi
,
Yang Cao 0011
,
Yasuhito Asano
,
Masatoshi Yoshikawa
.
dbsec 2019
:
143-163
[doi]
Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems
Cory Thoma
,
Alexandros Labrinidis
,
Adam J. Lee
.
dbsec 2019
:
261-280
[doi]
CASFinder: Detecting Common Attack Surface
Mengyuan Zhang
,
Yue Xin
,
Lingyu Wang 0001
,
Sushil Jajodia
,
Anoop Singhal
.
dbsec 2019
:
338-358
[doi]
2018
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds
Nawaf Alhebaishi
,
Lingyu Wang 0001
,
Sushil Jajodia
,
Anoop Singhal
.
dbsec 2018
:
3-20
[doi]
Towards Adaptive Access Control
Luciano Argento
,
Andrea Margheri
,
Federica Paci
,
Vladimiro Sassone
,
Nicola Zannone
.
dbsec 2018
:
99-109
[doi]
Privacy-Preserving Planarity Testing of Distributed Graphs
Guy Barshap
,
Tamir Tassa
.
dbsec 2018
:
131-147
[doi]
Enabling the Deployment of ABAC Policies in RBAC Systems
Gunjan Batra
,
Vijayalakshmi Atluri
,
Jaideep Vaidya
,
Shamik Sural
.
dbsec 2018
:
51-68
[doi]
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology
Amine Boukhtouta
,
Makan Pourzandi
,
Richard Brunner
,
Stéphane Dault
.
dbsec 2018
:
312-329
[doi]
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes
Edwin Bourget
,
Frédéric Cuppens
,
Nora Cuppens-Boulahia
,
Samuel Dubus
,
Simon N. Foley
,
Youssef Laarouchi
.
dbsec 2018
:
38-47
[doi]
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs
Chen Cao
,
Lun-Pin Yuan
,
Anoop Singhal
,
Peng Liu
,
Xiaoyan Sun
,
Sencun Zhu
.
dbsec 2018
:
330-348
[doi]
Image Pixelization with Differential Privacy
Liyue Fan
.
dbsec 2018
:
148-162
[doi]
"It's Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser
Majid Hatamian
,
Agnieszka Kitkowska
,
Jana Korunovska
,
Sabrina Kirrane
.
dbsec 2018
:
198-215
[doi]
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems
Thang Hoang
,
Attila A. Yavuz
,
F. Betül Durak
,
Jorge Guajardo
.
dbsec 2018
:
113-130
[doi]
On Understanding Permission Usage Contextuality in Android Apps
Md Zakir Hossen
,
Mohammad Mannan
.
dbsec 2018
:
232-242
[doi]
Private yet Efficient Decision Tree Evaluation
Marc Joye
,
Fariborz Salehi
.
dbsec 2018
:
243-259
[doi]
Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings
Florian Kerschbaum
,
Stefano Paraboschi
, editors,
Volume 10980 of
Lecture Notes in Computer Science
, Springer,
2018.
[doi]
Policy Languages and Their Suitability for Trust Negotiation
Martin Kolár
,
M. Carmen Fernández Gago
,
Javier López
.
dbsec 2018
:
69-84
[doi]
A Novel Hybrid Password Authentication Scheme Based on Text and Image
Ian Mackie
,
Merve Yildirim
.
dbsec 2018
:
182-197
[doi]
USBlock: Blocking USB-Based Keypress Injection Attacks
Sebastian Neuner
,
Artemios G. Voyiatzis
,
Spiros Fotopoulos
,
Collin Mulliner
,
Edgar R. Weippl
.
dbsec 2018
:
278-295
[doi]
Blockchain-Based Auditing of Transparent Log Servers
Hoang Long Nguyen
,
Jean-Philippe Eisenbarth
,
Claudia-Lavinia Ignat
,
Olivier Perrin 0001
.
dbsec 2018
:
21-37
[doi]
Role of Apps in Undoing of Privacy Policies on Facebook
Vishwas T. Patil
,
Nivia Jatain
,
R. K. Shyamasundar
.
dbsec 2018
:
85-98
[doi]
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies
B. S. Radhika
,
N. V. Narendra Kumar
,
R. K. Shyamasundar
.
dbsec 2018
:
219-231
[doi]
Breaking and Fixing the Security Proof of Garbled Bloom Filters
Cédric Van Rompay
,
Melek Önen
.
dbsec 2018
:
263-277
[doi]
Data Integrity Verification in Column-Oriented NoSQL Databases
Grisha Weintraub
,
Ehud Gudes
.
dbsec 2018
:
165-181
[doi]
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security
Jia Xu
,
Jianying Zhou 0001
.
dbsec 2018
:
299-311
[doi]
2017
High-Speed High-Security Public Key Encryption with Keyword Search
Rouzbeh Behnia
,
Attila Altay Yavuz
,
Muslum Ozgur Ozmen
.
dbsec 2017
:
365-385
[doi]
Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings
Giovanni Livraga
,
Sencun Zhu
, editors,
Volume 10359 of
Lecture Notes in Computer Science
, Springer,
2017.
[doi]
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense
Dieudonne Mulamba
,
Indrajit Ray
.
dbsec 2017
:
20-40
[doi]
Identification of Access Control Policy Sentences from Natural Language Policy Documents
Masoud Narouei
,
Hamed Khanpour
,
Hassan Takabi
.
dbsec 2017
:
82-100
[doi]
Undoing of Privacy Policies on Facebook
Vishwas T. Patil
,
R. K. Shyamasundar
.
dbsec 2017
:
239-255
[doi]
Efficient Protocols for Private Database Queries
Tushar Kanti Saha
,
Mayank
,
Takeshi Koshiba
.
dbsec 2017
:
337-348
[doi]
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases
Yossif Shalabi
,
Ehud Gudes
.
dbsec 2017
:
3-19
[doi]
Keylogger Detection Using a Decoy Keyboard
Seth Simms
,
Margot Maxwell
,
Sara Johnson
,
Julian L. Rrushi
.
dbsec 2017
:
433-452
[doi]
A Content-Aware Trust Index for Online Review Spam Detection
Hao Xue
,
FengJun Li
.
dbsec 2017
:
489-508
[doi]
Sign in
or
sign up
to see more results.