Accepted Papers

Full papers (14)

Sina Shaham, Gabriel Ghinita and Cyrus Shahabi. Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding
Joachim Biskup. Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered
Radu Ciucanu and Pascal Lafourcade. GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation
Yoram Meijaard, Bram Cappers, Josh Mengerink and Nicola Zannone. Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud
Fabian Böhm, Ludwig Englbrecht and Günther Pernul. Designing a Decision-Support Visualization for Live Digital Forensic Investigations
Anselme Tueno, Yordan Boev and Florian Kerschbaum. Non-Interactive Private Decision Tree Evaluation
Fahad Shaon and Murat Kantarcioglu. SGX-IR: Secure Information Retrieval with Trusted Processors
Marian Zaki, Adam Lee and Panos Chrysanthis. Privacy-Aware Shared-Operator Networks for Data Stream Management Systems
Luis Suarez, David Espes, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin and Philippe Le Parc. Managing secure inter-slice communication in 5G Network Slice Chains
Manel Smine, David Espes, Nora Cuppens and Frédéric Cuppens. Network Functions Virtualisation Access Control as a Service
Marius Stübs, Tobias Mueller, Kai Bavendiek, Manuel Lösch and Sibylle Schupp. Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids
Farnaz Tahmasebian, Li Xiong, Mani Sotoodeh and Vaidy Sunderam. Crowdsourcing under Data Poisoning Attacks: A Comparative Study
Nawaf Alhebaishi, Lingyu Wang and Sushil Jajodia. Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)
Andy Dolan, Indrakshi Ray and Suryadipta Majumdar. Proactively Extracting IoT Device Capabilities: An Application to Smart Homes

Short papers (8)

Amir Lukach, Ehud Gudes and Asaf Shabtai. PUA Detection Based on Bundle Installer Characteristics
Sandip Ghosal and R. K. Shyamasundar. Information Flow Security Certification for SPARK Programs
Barbara Krumay and Jenny Klar. Measuring Readability of Privacy Policies
Rudolf Mayer, Markus Hittmeir and Andreas Ekelhart. Privacy-preserving Anomaly Detection based on Synthetic Data
Daniel Schlette, Florian Menges, Thomas Baumer and Günther Pernul. Security Enumerations for Cyber-Physical Systems
Jeyamohan Neera, Xiaomin Chen, Nauman Aslam and Zhan Shu. Local Differentially Private Matrix Factorization with MoG for Recommendations
Andreas Schaad and Dominik Binder. ML-based identification and prioritization of threats in the OVVL Threat Modelling tool
Phuong Thao Tran, Mhd Irvan, Ryosuke Kobayashi, Toshiyuki Nakata and Rie Shigetomi Yamaguchi. Self-Enhancing GPS-based Authentication Using Corresponding Address