Program - Wednesday, May 30, 2018

9.20 - 9.30 Welcome and opening
9.30 - 10.30 Keynote talk (Chair: Sara Foresti)

Wenjing Lou, Virginia Tech, USA

10.30 - 11.00 Coffee Break
11.00 - 12.30 Session 1: Data sharing and pubblication

PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
Azadeh Tabiban; Suryadipta Majumdar; Lingyu Wang; Mourad Debbabi

Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Xiao-Si Wang; Ian Herwono; Francesco Di Cerbo; Paul Kearney; Mark Shackleton

A General Framework for Maintaining K-Anonymity on Dynamic Databases
Julian Salas; Vicenc Torra

An Anonymous Data Control Access Protocol in Distributed Storage Systems (short paper)
Gil Utard; Mariem Ben Fadhl
12.30 - 14.00 Lunch Break
14.00 - 15.15 Session 2: Access control and cryptographic protocols (Chair: Gil Utard)

Emergency Access Control Management Via Attribute Based Encrypted QR Codes
Sana Belguith; Sarada Prasad Gochhayat; Mauro Conti; Giovanni Russello

Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Qiuxiang Dong; Dijiang Huang; Jim Luo; Myong Kang

Delegating Elliptic-Curve Operations with Homomorphic Encryption
Carlos Aguilar-Melchor; Jean-Christophe Deneuville; Philippe Gaborit; Tancrede Lepoint; Thomas Ricosset
15.15 - 15.45 Coffee Break
15.45 - 17.00 Session 3: Vulnerabilities and attacks (Chair: Selina Wang)

Spot the Difference: Your Bucket is Leaking
Ankit Gangwal; Mauro Conti; Sarada Prasad Gochhayat; Gabriele Tolomei

LMHADC: Lightweight Method for Host based Anomaly Detection in Cloud using Mobile Agents
Tao Qin; Ruoya Chen; Lei Wang; Chao He

Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Yingjie Guo; Liwei Chen; Gang Shi