default search action
19. ESORICS 2014: Wroclaw, Poland - DPM/SETOP/QASA
- Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8872, Springer 2015, ISBN 978-3-319-17015-2
Keynote Talks
- Jordi Herrera-Joancomartí:
Research and Challenges on Bitcoin Anonymity. 3-16 - Elisa Bertino:
Data Trustworthiness - Approaches and Research Challenges. 17-25 - Audun Jøsang:
Assurance Requirements for Mutual User and Service Provider Authentication. 26-44
Data Privacy Management
- Josep Domingo-Ferrer, Alberto Blanco-Justicia:
Group Discounts Compatible with Buyer Privacy. 47-57 - Sébastien Gambs, Samuel Ranellucci, Alain Tapp:
The Crypto-Democracy and the Trustworthy (Position Paper). 58-76 - Markus Tschersich:
Configuration Behavior of Restrictive Default Privacy Settings on Social Network Sites - Analyzing the Combined Effect of Default Settings and Interface Style. 77-94 - Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani, Iakovos S. Venieris:
Towards Inherent Privacy Awareness in Workflows. 95-113 - Jens Köhler, Hannes Hartenstein:
Index Optimization for L-Diversified Database-as-a-Service. 114-132 - Alberto Blanco-Justicia, Josep Domingo-Ferrer:
Privacy-Preserving Loyalty Programs. 133-146 - Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Secure Improved Cloud-Based RFID Authentication Protocol. 147-164
Autonomous and Spontaneous Security
- Tarek Bouyahia, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:
Metric for Security Activities Assisted by Argumentative Logic. 183-197
Quantitative Aspects in Security Assurance
- Wolter Pieters, Mohsen Davarynejad:
Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. 201-215 - Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin:
Analysis of Social Engineering Threats with Attack Graphs. 216-232 - Jerry den Hartog, Ilaria Matteucci:
Introducing Probabilities in Controller Strategies. 233-249 - Tom Chothia, Chris Novakovic, Rajiv Ranjan Singh:
Automatically Calculating Quantitative Integrity Measures for Imperative Programs. 250-265 - Alessandro Armando, Michele Bezzi, Nadia Metoui, Antonino Sabetta:
Risk-Aware Information Disclosure. 266-276 - Christian Johansen, Audun Jøsang:
Probabilistic Modelling of Humans in Security Ceremonies. 277-292 - Maxime Puys, Lionel Rivière, Julien Bringer, Thanh-Ha Le:
High-Level Simulation for Multiple Fault Injection Evaluation. 293-308
Short Papers
- Bernardo Ferreira, João Rodrigues, João Leitão, Henrique João L. Domingos:
Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties. 311-318 - Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Karin Bernsmed, Anderson Santana de Oliveira, Jakub Sendor:
A-PPL: An Accountability Policy Language. 319-326 - Roger Jardí-Cedó, Jordi Castellà-Roca, Alexandre Viejo:
Privacy-Preserving Electronic Toll System with Dynamic Pricing for Low Emission Zones. 327-334 - Amel Hamzaoui, Qutaibah M. Malluhi, Chris Clifton, Ryan D. Riley:
Association Rule Mining on Fragmented Database. 335-342
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.