Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_20
Khalid Shahbar, A. N. Zincir-Heywood
{"title":"Weighted Factors for Evaluating Anonymity","authors":"Khalid Shahbar, A. N. Zincir-Heywood","doi":"10.1007/978-3-319-75650-9_20","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_20","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_7
T. Saha, Takeshi Koshiba
{"title":"Privacy-Preserving Equality Test Towards Big Data","authors":"T. Saha, Takeshi Koshiba","doi":"10.1007/978-3-319-75650-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_7","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116500305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_10
Julio Navarro, V. Legrand, S. Lagraa, J. François, Abdelkader Lahmadi, Giulia De Santis, O. Festor, Nadira Lammari, F. Hamdi, A. Deruyver, Quentin Goux, Morgan Allard, P. Parrend
{"title":"HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment","authors":"Julio Navarro, V. Legrand, S. Lagraa, J. François, Abdelkader Lahmadi, Giulia De Santis, O. Festor, Nadira Lammari, F. Hamdi, A. Deruyver, Quentin Goux, Morgan Allard, P. Parrend","doi":"10.1007/978-3-319-75650-9_10","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114840017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_8
L. Logrippo
{"title":"Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy","authors":"L. Logrippo","doi":"10.1007/978-3-319-75650-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_8","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133291363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_19
G. G. Granadillo, E. Doynikova, Igor Kotenko, Joaquín García
{"title":"Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric","authors":"G. G. Granadillo, E. Doynikova, Igor Kotenko, Joaquín García","doi":"10.1007/978-3-319-75650-9_19","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_19","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126501442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_6
H. Halpin
{"title":"A Roadmap for High Assurance Cryptography","authors":"H. Halpin","doi":"10.1007/978-3-319-75650-9_6","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_6","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_13
Shujie Cui, M. R. Asghar, S. Galbraith, G. Russello
{"title":"ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage","authors":"Shujie Cui, M. R. Asghar, S. Galbraith, G. Russello","doi":"10.1007/978-3-319-75650-9_13","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_13","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_18
Sunny Raj, Laura Pullum, A. Ramanathan, Sumit Kumar Jha
{"title":"SATYA : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing","authors":"Sunny Raj, Laura Pullum, A. Ramanathan, Sumit Kumar Jha","doi":"10.1007/978-3-319-75650-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_18","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133735301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_1
Johannes Blömer, P. Günther, Volker Krummel, Nils Löken
{"title":"Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations","authors":"Johannes Blömer, P. Günther, Volker Krummel, Nils Löken","doi":"10.1007/978-3-319-75650-9_1","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_1","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-23DOI: 10.1007/978-3-319-75650-9_3
Alexey Rabin, E. Gudes
{"title":"Secure Protocol of ABAC Certificates Revocation and Delegation","authors":"Alexey Rabin, E. Gudes","doi":"10.1007/978-3-319-75650-9_3","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_3","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126977017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}