Conference on Data and Applications Security and Privacy (DBSec'21)

Accepted Papers

You can access and read the papers here.

Full Papers

#Title\Authors
1DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks
Liyue Fan and Akarsh Pokkunuru
2Comparing local and central differential privacy using membership inference attacks
Daniel Bernau, Jonas Robl, Philip W. Grassal, Steffen Schneider and Florian Kerschbaum
3Preventing Manipulation Attack in Local Differential Privacy using Verifiable Randomization Mechanism
Fumiyuki Kato, Yang Cao and Masatoshi Yoshikawa
4Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-Maps
Jiafan Wang and Sherman S. M. Chow
5Distributed query evaluation over encrypted data
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati
6Multi-party Private Set Operations with an External Decider
Sara Ramezanian, Tommi Meskanen and Valtteri Niemi
7Encrypted-Input Obfuscation of Image Classifiers
Giovanni Di Crescenzo, Lisa Bahler, Brian Coan, Kurt Rohloff, Yuriy Polyakov and Dave Cousins
8Verifiable Hierarchical Key Assignment Schemes
Anna Lisa Ferrara, Federica Paci and Chiara Ricciardi
9An ABAC model with Trust and Gossiping (ABAC–TG) for online social networks
Adi Swissa and Ehud Gudes
10Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Dataset
Mina Sheikhalishahi and Nicola Zannone
11A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness
Ioannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsabanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou and Ruben Verborgh
12A Digital Twin-based Cyber Range for SOC Analysts
Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos and Günther Pernul
13Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks
Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine and Michael Rusinowitch
14Access Control Policy Generation From User Stories Using Machine Learning
John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu
15Perun: Confidential Multi-Stakeholder Machine Learning Framework with Hardware Acceleration Support
Wojciech Ozga, Do Le Quoc and Christof Fetzer

Short Papers

#Title\Authors
1Nowhere to Leak: A Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting
Alexandros Bakas and Antonis Michalas
2Preserving Privacy of Co-Occurring Keywords over Encrypted Data
D.V.N. Siva Kumar and P. Santhi Thilagam
3On Feasibility of Attribute-Aware Relationship Based Access Control Policy Mining
Shuvra Chakraborty and Ravi Sandhu
4DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things
Na Shi, Bo Tang, Ravi Sandhu and Qi Li
5The tkl-Score for Data-Sharing Misuseability
Kalvin Eng and Eleni Stroulia
6Automated Risk Assessment and Trade-Off Analysis of OpenID Connect and OAuth 2.0 Deployments
Salimeh Dashti, Amir Sharif, Roberto Carbone and Silvio Ranise
7PDF Malware Detection Using Visualization and Machine Learning
Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang and Hung-Min Sun
8Deep Learning for Detecting Network Attacks: An End-to-end Approach
Qingtian Zou, Anoop Singhal, Xiaoyan Sun and Peng Liu