DBSEC 2016 July 18, 2016 to July 20, 2016, trento,italy

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Deciphering Text from Touchscreen Key Taps Jaideep Vaidya , Shamik Sural , Vijayalakshmi Atluri , Haritabh Gupta N/A
Data Governance & Transparency for Collaborative Systems Nicola Zannone , Jerry Den Hartog , Rauf Mahmudlu N/A
Private and Secure Secret Shared MapReduce Shlomi Dolev , Shantanu Sharma , Yin Li N/A
Mining Hierarchical Temporal Roles with Multiple Metrics Scott d. Stoller , Thang Bui N/A
Guaranteeing correctness of bulk operations in outsourced databases Luca Ferretti , Michele Colajanni , Mirco Marchetti N/A
Formalizing Threat Models for Virtualized Systems Daniele Sgandurra , Erisa Karafili , Emil Lupu N/A
Inter-ReBAC: Inter-operation of relationship-based access control model instances Jason Crampton , James Sellwood N/A
Runtime detection of zero-day vulnerability exploits in contemporary software systems Simon Foley , Olgierd Pieczul N/A
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services Edgar Weippl , Georg Merzdovnik , Martin Schmiedecker , Klaus Falb , Artemios Voyiatzis N/A
Towards Creating HoneyProjects for Detecting Data Theft Milan Petkovic , Jerry Den Hartog , Stefan Thaler N/A
Sharing-habits based privacy control in social networks Ehud Gudes , Nurit Gal-oz , Silvie Levy N/A
Counteracting active attacks in social network graphs Sjouke Mauw , Rolando Trujillo , Bochuan Xuan N/A
Role-Centric Circle of Trust in Multi-Tenant Cloud IaaS Ravi Sandhu , Navid Pustchi N/A
A Comparison of Logical-formula and Enumerated Authorization Policy ABAC Models Ram Krishnan , Ravi Sandhu , Prosunjit Biswas N/A
Access Control for the Shuffle Index Pierangela Samarati , Sabrina Vimercati , Sara Foresti , Stefano Paraboschi , Gerardo Pelosi N/A
Practical Differentially Private Modeling of Human Movement Data Murat Kantarcioglu , Latanya Sweeney , Harichandan Roy N/A
The Fréchet/Manhattan distance and the trajectory anonymisation problem Rolando Trujillo , Christof Ferreira Torres N/A
Reasoning about Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems Julien Bringer , Roch Lescuyer , Herve Chabanne , Daniel Le Métayer N/A
Reasoning About Firewall Policies Through Refinement and Composition Simon Foley , Ultan Neville N/A
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols Giovanni Di Crescenzo , Thimios Panagos , Brian Coan N/A
CheapSMC: A Framework to Minimize SMC Cost in Cloud Murat Kantarcioglu , Erman Pattuk , Huseyin Ulusoy , Brad Malin N/A
Diversifying Network Services under Cost Constraints for Better Resilience against Unknown Attacks Sushil Jajodia , Lingyu Wang , Anoop Singhal , Daniel Borbor N/A
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data Fahad Shaon , Murat Kantarcioglu N/A