Search dblp for Publications

export results for "toc:db/conf/codaspy/codaspy2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/codaspy/AhmadiUSTG16,
  author       = {Mansour Ahmadi and
                  Dmitry Ulyanov and
                  Stanislav Semenov and
                  Mikhail Trofimov and
                  Giorgio Giacinto},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Novel Feature Extraction, Selection and Fusion for Effective Malware
                  Family Classification},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {183--194},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857713},
  doi          = {10.1145/2857705.2857713},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/AhmadiUSTG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlizadehZ16,
  author       = {Mahdi Alizadeh and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Risk-based Analysis of Business Process Executions},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {130--132},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857742},
  doi          = {10.1145/2857705.2857742},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/AlizadehZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AonoHPW16,
  author       = {Yoshinori Aono and
                  Takuya Hayashi and
                  Le Trieu Phong and
                  Lihua Wang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Scalable and Secure Logistic Regression via Homomorphic Encryption},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {142--144},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857731},
  doi          = {10.1145/2857705.2857731},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AonoHPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BalliuLSS16,
  author       = {Musard Balliu and
                  Benjamin Liebe and
                  Daniel Schoepe and
                  Andrei Sabelfeld},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {{JSLINQ:} Building Secure Applications across Tiers},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {307--318},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857717},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/BalliuLSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CaiY16,
  author       = {Zhenquan Cai and
                  Roland H. C. Yap},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Inferring the Detection Logic and Evaluating the Effectiveness of
                  Android Anti-Virus Apps},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {172--182},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857719},
  doi          = {10.1145/2857705.2857719},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/CaiY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChenWWL16,
  author       = {Yue Chen and
                  Zhi Wang and
                  David B. Whalley and
                  Long Lu},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Remix: On-demand Live Randomization},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {50--61},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857726},
  doi          = {10.1145/2857705.2857726},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChenWWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChristoulakisCA16,
  author       = {Nick Christoulakis and
                  George Christou and
                  Elias Athanasopoulos and
                  Sotiris Ioannidis},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {{HCFI:} Hardware-enforced Control-Flow Integrity},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {38--49},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857722},
  doi          = {10.1145/2857705.2857722},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChristoulakisCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CombiVZ16,
  author       = {Carlo Combi and
                  Luca Vigan{\`{o}} and
                  Matteo Zavatteri},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Security Constraints in Temporal Role-Based Access-Controlled Workflows},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857716},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/CombiVZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CramptonS16,
  author       = {Jason Crampton and
                  James Sellwood},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {{ARPPM:} Administration in the {RPPM} Model},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {219--230},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857711},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/CramptonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/DjokoJL16,
  author       = {Judicael Briand Djoko and
                  Brandon Jennings and
                  Adam J. Lee},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {{TPRIVEXEC:} Private Execution in Virtual Memory},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {285--294},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857724},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/DjokoJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/EgnerLHZ16,
  author       = {Alexandru Ionut Egner and
                  Duc Luu and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {An Authorization Service for Collaborative Situation Awareness},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {136--138},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857740},
  doi          = {10.1145/2857705.2857740},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/EgnerLHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/FadhelBBH16,
  author       = {Ameni Ben Fadhel and
                  Domenico Bianculli and
                  Lionel C. Briand and
                  Benjamin Hourte},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {A Model-driven Approach to Representing and Checking {RBAC} Contextual
                  Policies},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {243--253},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857709},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/FadhelBBH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/FadolalkarimSB16,
  author       = {Daren Fadolalkarim and
                  Asmaa Sallam and
                  Elisa Bertino},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {{PANDDE:} Provenance-based ANomaly Detection of Data Exfiltration},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {267--276},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857710},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/FadolalkarimSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GaoLLW16,
  author       = {Xing Gao and
                  Dachuan Liu and
                  Daiping Liu and
                  Haining Wang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {On Energy Security of Smartphones},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {148--150},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857738},
  doi          = {10.1145/2857705.2857738},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GaoLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GombeARR16,
  author       = {Aisha I. Ali{-}Gombe and
                  Irfan Ahmed and
                  Golden G. Richard III and
                  Vassil Roussev},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {AspectDroid: Android App Analysis System},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {145--147},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857739},
  doi          = {10.1145/2857705.2857739},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GombeARR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GriecoGURFM16,
  author       = {Gustavo Grieco and
                  Guillermo Luis Grinblat and
                  Lucas C. Uzal and
                  Sanjay Rawat and
                  Josselin Feist and
                  Laurent Mounier},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Toward Large-Scale Vulnerability Discovery using Machine Learning},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857720},
  doi          = {10.1145/2857705.2857720},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GriecoGURFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GuL16,
  author       = {Yufei Gu and
                  Zhiqiang Lin},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Derandomizing Kernel Address Space Layout for Memory Introspection
                  and Forensics},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {62--72},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857707},
  doi          = {10.1145/2857705.2857707},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GuL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HoffmannRMWGH16,
  author       = {Johannes Hoffmann and
                  Teemu Rytilahti and
                  Davide Maiorca and
                  Marcel Winandy and
                  Giorgio Giacinto and
                  Thorsten Holz},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Evaluating Analysis Tools for Android Apps: Status Quo and Robustness
                  Against Obfuscation},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {139--141},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857737},
  doi          = {10.1145/2857705.2857737},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/HoffmannRMWGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KarumanchiLS16,
  author       = {Sushama Karumanchi and
                  Jingwei Li and
                  Anna Cinzia Squicciarini},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Efficient Network Path Verification for Policy-routedQueries},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {319--328},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857715},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KarumanchiLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Knight16,
  author       = {John Knight},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {{DIVERSITY}},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {151},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857728},
  doi          = {10.1145/2857705.2857728},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Knight16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MadiMWJPW16,
  author       = {Taous Madi and
                  Suryadipta Majumdar and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Auditing Security Compliance of the Virtualized Infrastructure in
                  the Cloud: Application to OpenStack},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857721},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MadiMWJPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MaheswaranJZWF16,
  author       = {John Maheswaran and
                  Daniel Jackowitz and
                  Ennan Zhai and
                  David Isaac Wolinsky and
                  Bryan Ford},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Building Privacy-Preserving Cryptographic Credentials from Federated
                  Online Identities},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {3--13},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857725},
  doi          = {10.1145/2857705.2857725},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MaheswaranJZWF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MarinS0VP16,
  author       = {Eduard Marin and
                  Dave Singel{\'{e}}e and
                  Bohan Yang and
                  Ingrid Verbauwhede and
                  Bart Preneel},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {On the Feasibility of Cryptography for a Wireless Insulin Pump System},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {113--120},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857746},
  doi          = {10.1145/2857705.2857746},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/MarinS0VP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MaruseacG16,
  author       = {Mihai Maruseac and
                  Gabriel Ghinita},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Privacy-Preserving Mining of Sequential Association Rules from Provenance
                  Workflows},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {127--129},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857743},
  doi          = {10.1145/2857705.2857743},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MaruseacG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MedeirosBNC16,
  author       = {Iberia Medeiros and
                  Miguel Beatriz and
                  Nuno Ferreira Neves and
                  Miguel Correia},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Hacking the {DBMS} to Prevent Injection Attacks},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {295--306},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857723},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MedeirosBNC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MohamedSS16,
  author       = {Manar Mohamed and
                  Babins Shrestha and
                  Nitesh Saxena},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {SMASheD: Sniffing and Manipulating Android Sensor Data},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {152--159},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857749},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MohamedSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MonshizadehNV16,
  author       = {Maliheh Monshizadeh and
                  Prasad Naldurg and
                  V. N. Venkatakrishnan},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Patching Logic Vulnerabilities for Web Applications using LogicPatcher},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857727},
  doi          = {10.1145/2857705.2857727},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MonshizadehNV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Nikolich16,
  author       = {Anita Nikolich},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {{SDN} Research Challenges and Opportunities},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {254},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857730},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Nikolich16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/PustchiPS16,
  author       = {Navid Pustchi and
                  Farhan Patwa and
                  Ravi S. Sandhu},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Multi Cloud IaaS with Domain Trust in OpenStack},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {121--123},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857745},
  doi          = {10.1145/2857705.2857745},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/PustchiPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/RizviF16,
  author       = {Syed Zain R. Rizvi and
                  Philip W. L. Fong},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Interoperability of Relationship- and Role-Based Access Control},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {231--242},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857706},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/RizviF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/StanciuSCG16,
  author       = {Valeriu{-}Daniel Stanciu and
                  Riccardo Spolaor and
                  Mauro Conti and
                  Cristiano Giuffrida},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against
                  Statistical Attacks},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {105--112},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857748},
  doi          = {10.1145/2857705.2857748},
  timestamp    = {Thu, 23 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/StanciuSCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/StevensC016,
  author       = {Ryan Stevens and
                  Jonathan Crussell and
                  Hao Chen},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {On the Origin of Mobile Apps: Network Provenance for Android Applications},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {160--171},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857712},
  doi          = {10.1145/2857705.2857712},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/StevensC016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SuCLBJ16,
  author       = {Dong Su and
                  Jianneng Cao and
                  Ninghui Li and
                  Elisa Bertino and
                  Hongxia Jin},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Differentially Private K-Means Clustering},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {26--37},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857708},
  doi          = {10.1145/2857705.2857708},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/SuCLBJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TamrakarRARW16,
  author       = {Anjila Tamrakar and
                  Justin D. Russell and
                  Irfan Ahmed and
                  Golden G. Richard III and
                  Carl F. Weems},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {{SPICE:} {A} Software Tool for Bridging the Gap Between End-user's
                  Insecure Cyber Behavior and Personality Traits},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {124--126},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857744},
  doi          = {10.1145/2857705.2857744},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/TamrakarRARW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TaylorHWJSMS16,
  author       = {Teryl Taylor and
                  Xin Hu and
                  Ting Wang and
                  Jiyong Jang and
                  Marc Ph. Stoecklin and
                  Fabian Monrose and
                  Reiner Sailer},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Detecting Malicious Exploit Kits using Tree-based Similarity Searches},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {255--266},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857718},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/TaylorHWJSMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TomuroLH16,
  author       = {Noriko Tomuro and
                  Steven L. Lytinen and
                  Kurt Hornsburg},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Automatic Summarization of Privacy Policies using Ensemble Learning},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {133--135},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857741},
  doi          = {10.1145/2857705.2857741},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/TomuroLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Voas16,
  author       = {Jeffrey M. Voas},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Decoding the Mystery of the Internet of Things},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857729},
  doi          = {10.1145/2857705.2857729},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Voas16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XiaoWLMW16,
  author       = {Gaoyao Xiao and
                  Jun Wang and
                  Peng Liu and
                  Jiang Ming and
                  Dinghao Wu},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Program-object Level Data Flow Analysis with Applications to Data
                  Leakage and Contamination Forensics},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {277--284},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857747},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/XiaoWLMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/YounisMAR16,
  author       = {Awad A. Younis and
                  Yashwant K. Malaiya and
                  Charles Anderson and
                  Indrajit Ray},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {To Fear or Not to Fear That is the Question: Code Characteristics
                  of a Vulnerable Functionwith an Existing Exploit},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {97--104},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857750},
  doi          = {10.1145/2857705.2857750},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/YounisMAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZarrasKDP16,
  author       = {Apostolis Zarras and
                  Katharina Kohls and
                  Markus D{\"{u}}rmuth and
                  Christina P{\"{o}}pper},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Neuralyzer: Flexible Expiration Times for the Revocation of Online
                  Data},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {14--25},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857714},
  doi          = {10.1145/2857705.2857714},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZarrasKDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2016,
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2857705},
  isbn         = {978-1-4503-3935-3},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}