Conference on Data and Applications Security and Privacy (DBSec'21)

Conference Program

The links to the conference sessions will be sent to your email by July 15th. Please make sure to register before the deadline to receive the links.

  • Please note that:
    • For full papers, the presentation should *not* exceed 15 minutes with 5 minutes for Q/A.
    • For short papers, the presentation should *not* exceed 10 minutes with 5 minutes for Q/A.

Monday, July 19, 2021 (Day One)

Session OneTitle
(Calgary Time)
DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks
Liyue Fan and Akarsh Pokkunuru

Comparing local and central differential privacy using membership inference attacks
Daniel Bernau, Jonas Robl, Philip W. Grassal, Steffen Schneider and Florian Kerschbaum

Preventing Manipulation Attack in Local Differential Privacy using Verifiable Randomization Mechanism
Fumiyuki Kato, Yang Cao and Masatoshi Yoshikawa

Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-Maps
Jiafan Wang and Sherman S. M. Chow

Distributed query evaluation over encrypted data
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati

Nowhere to Leak: A Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting
Alexandros Bakas and Antonis Michalas
Session TwoTitle
(Calgary Time)
Multi-party Private Set Operations with an External Decider
Sara Ramezanian, Tommi Meskanen and Valtteri Niemi

Encrypted-Input Obfuscation of Image Classifiers
Giovanni Di Crescenzo, Lisa Bahler, Brian Coan, Kurt Rohloff, Yuriy Polyakov and Dave Cousins

Preserving Privacy of Co-Occurring Keywords over Encrypted Data
D.V.N. Siva Kumar and P. Santhi Thilagam

Verifiable Hierarchical Key Assignment Schemes
Anna Lisa Ferrara, Federica Paci and Chiara Ricciardi

An ABAC model with Trust and Gossiping (ABAC–TG) for online social networks
Adi Swissa and Ehud Gudes

On Feasibility of Attribute-Aware Relationship Based Access Control Policy Mining
Shuvra Chakraborty and Ravi Sandhu

Tuesday, July 20, 2021 (Day Two)

Session ThreeTitle
9:00-11:10 (Calgary Time)Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Dataset
Mina Sheikhalishahi and Nicola Zannone

A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness
Ioannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsabanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou and Ruben Verborgh

DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things
Na Shi, Bo Tang, Ravi Sandhu and Qi Li

A Digital Twin-based Cyber Range for SOC Analysts
Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos and Günther Pernul

Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks
Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine and Michael Rusinowitch

The tkl-Score for Data-Sharing Misuseability
Kalvin Eng and Eleni Stroulia

Automated Risk Assessment and Trade-Off Analysis of OpenID Connect and OAuth 2.0 Deployments
Salimeh Dashti, Amir Sharif, Roberto Carbone and Silvio Ranise
Session FourTitle
(Calgary Time)
Access Control Policy Generation From User Stories Using Machine Learning
John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu

Perun: Confidential Multi-Stakeholder Machine Learning Framework with Hardware Acceleration Support
Wojciech Ozga, Do Le Quoc and Christof Fetzer

PDF Malware Detection Using Visualization and Machine Learning
Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang and Hung-Min Sun

Deep Learning for Detecting Network Attacks: An End-to-end Approach
Qingtian Zou, Anoop Singhal, Xiaoyan Sun and Peng Liu

11.3 WG Business Meeting
Dr. Sara Foresti