A General Framework for Maintaining K-Anonymity on Dynamic Databases
Julian Salas; Vicenc Torra
An Anonymous Data Control Access Protocol in Distributed Storage Systems (short paper)
Gil Utard; Mariem Ben Fadhl
12.30 - 14.00 Lunch Break
14.00 - 15.15 Session 2: Access control and cryptographic protocols (Chair: Gil Utard)
Emergency Access Control Management Via Attribute Based Encrypted QR Codes
Sana Belguith; Sarada Prasad Gochhayat; Mauro Conti; Giovanni Russello
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Qiuxiang Dong; Dijiang Huang; Jim Luo; Myong Kang
Delegating Elliptic-Curve Operations with Homomorphic Encryption
Carlos Aguilar-Melchor; Jean-Christophe Deneuville; Philippe Gaborit; Tancrede Lepoint; Thomas Ricosset
15.15 - 15.45 Coffee Break
15.45 - 17.00 Session 3: Vulnerabilities and attacks (Chair: Selina Wang)
Spot the Difference: Your Bucket is Leaking
Ankit Gangwal; Mauro Conti; Sarada Prasad Gochhayat; Gabriele Tolomei
LMHADC: Lightweight Method for Host based Anomaly Detection in Cloud using Mobile Agents
Tao Qin; Ruoya Chen; Lei Wang; Chao He
Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Yingjie Guo; Liwei Chen; Gang Shi