Accepted Papers

(in alphabetical order of title)


Full Papers

A general framework for maintaining k-anonymity on dynamic databases
Julian Salas; Vicenc Torra

Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Qiuxiang Dong; Dijiang Huang; Jim Luo; Myong Kang

Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Xiao-Si Wang; Ian Herwono; Francesco Di Cerbo; Paul Kearney; Mark Shackleton

Delegating Elliptic-Curve Operations with Homomorphic Encryption
Carlos Aguilar-Melchor; Jean-Christophe Deneuville; Philippe Gaborit; Tancrède Lepoint; Thomas Ricosset

Emergency Access Control Management Via Attribute Based Encrypted QR Codes
Sana Belguith; Sarada Prasad Gochhayat; Mauro Conti; Giovanni Russello

Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Yingjie Guo; Liwei Chen; Gang Shi

LMHADC: Lightweight Method for Host based Anomaly Detection in Cloud using Mobile Agents
Tao Qin; Ruoya Chen; Lei Wang; Chao He

PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
Azadeh Tabiban; Suryadipta Majumdar; Lingyu Wang; Mourad Debbabi

Spot the Difference: Your Bucket is Leaking
Ankit Gangwal; Mauro Conti; Sarada Prasad Gochhayat; Gabriele Tolomei

Short Papers

An Anonymous Data Control Access Protocol in Distributed Storage Systems
Gil Utard; Mariem Ben Fadhl