Data and Applications Security and Privacy XXXVIII

Data and Applications Security and Privacy XXXVIII

38th Annual IFIP 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings

Ferrara, Anna Lisa; Krishnan, Ram

Springer International Publishing AG

08/2024

326

Mole

9783031651717

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Access Control.

.- A Graph-based Framework for ABAC Policy Enforcement and Analysis.

.- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation.

.- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence.

.- Crypto Application.

.- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security.

.- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing.

.- Towards Atomicity and Composability in Cross-Chain NFTs.

.- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM.

.- Privacy.

.- DT-Anon: Decision Tree Target-Driven Anonymization.

.- Visor: Privacy-preserving Reputation for Decentralized Marketplaces.

.- Attack.

.- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods.

.- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024.

.- Optimal Automated Generation of Playbooks.

.- ML Attack, Vulnerablity.

.- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning.

.- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning.

.- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset.

.- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping.

.- Security User Studies.

.- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics.

.- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users.

.- Differential Privacy.

.- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains.

.- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
access control;privacy;anonymity;data protection;data security;vulnerability;risk management;secure distributed systems;ML attacks