Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_13
Hibiki Ono, Yoshifumi Manabe
{"title":"Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations","authors":"Hibiki Ono, Yoshifumi Manabe","doi":"10.1007/978-3-030-18419-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_13","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121560883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_4
David Bissessar, Maryam Hezaveh, Fayzah Alshammari, C. Adams
{"title":"Mobile Travel Credentials","authors":"David Bissessar, Maryam Hezaveh, Fayzah Alshammari, C. Adams","doi":"10.1007/978-3-030-18419-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130412193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_6
Xavier Bultel, Radu Ciucanu, Matthieu Giraud, P. Lafourcade, Lihua Ye
{"title":"Secure Joins with MapReduce","authors":"Xavier Bultel, Radu Ciucanu, Matthieu Giraud, P. Lafourcade, Lihua Ye","doi":"10.1007/978-3-030-18419-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_6","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_5
Suryadipta Majumdar, Taous Madi, Yosr Jarraya, M. Pourzandi, Lingyu Wang, M. Debbabi
{"title":"Cloud Security Auditing: Major Approaches and Existing Challenges","authors":"Suryadipta Majumdar, Taous Madi, Yosr Jarraya, M. Pourzandi, Lingyu Wang, M. Debbabi","doi":"10.1007/978-3-030-18419-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_5","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128273294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_19
Antonio Nehme, Vitor Jesus, K. Mahbub, A. Abdallah
{"title":"Fine-Grained Access Control for Microservices","authors":"Antonio Nehme, Vitor Jesus, K. Mahbub, A. Abdallah","doi":"10.1007/978-3-030-18419-3_19","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_19","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_7
A. Chohra, M. Debbabi, Paria Shirani
{"title":"Daedalus: Network Anomaly Detection on IDS Stream Logs","authors":"A. Chohra, M. Debbabi, Paria Shirani","doi":"10.1007/978-3-030-18419-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_7","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114586400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_2
S. Gambs
{"title":"Privacy and Ethical Challenges in Big Data","authors":"S. Gambs","doi":"10.1007/978-3-030-18419-3_2","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_2","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_9
Tahir Ahmad, Silvio Ranise
{"title":"Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper)","authors":"Tahir Ahmad, Silvio Ranise","doi":"10.1007/978-3-030-18419-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_9","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_12
Yuri Gil Dantas, T. Hamann, H. Mantel
{"title":"A Comparative Study Across Static and Dynamic Side-Channel Countermeasures","authors":"Yuri Gil Dantas, T. Hamann, H. Mantel","doi":"10.1007/978-3-030-18419-3_12","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123774232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-13DOI: 10.1007/978-3-030-18419-3_11
Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet
{"title":"Protection of Systems Against Fuzzing Attacks","authors":"Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet","doi":"10.1007/978-3-030-18419-3_11","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_11","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}