2024
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model.
IACR Cryptol. ePrint Arch., 2024
Collaborative CP-NIZKs: Modular, Composable Proofs for Distributed Secrets.
IACR Cryptol. ePrint Arch., 2024
Undesirable Memorization in Large Language Models: A Survey.
CoRR, 2024
Fuzzing Frameworks for Server-side Web Applications: A Survey.
CoRR, 2024
Privacy-Preserving, Dropout-Resilient Aggregation in Decentralized Learning.
CoRR, 2024
Privacy-Preserving Aggregation for Decentralized Learning with Byzantine-Robustness.
CoRR, 2024
VPAS: Publicly Verifiable and Privacy-Preserving Aggregate Statistics on Distributed Datasets.
CoRR, 2024
2023
Security and privacy concerns in cloud-based scientific and business workflows: A systematic review.
Future Gener. Comput. Syst., November, 2023
Verifiable Privacy-Preserving Computing.
CoRR, 2023
Federated Synthetic Data Generation with Stronger Security Guarantees.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Continuous Fuzzing: A Study of the Effectiveness and Scalability of Fuzzing in CI/CD Pipelines.
Proceedings of the IEEE/ACM International Workshop on Search-Based and Fuzz Testing, 2023
SecFlow: Adaptive Security-Aware Workflow Management System in Multi-cloud Environments.
Proceedings of the Enterprise Design, Operations, and Computing. EDOC 2023 Workshops, 2023
2022
Private computation of polynomials over networks.
Syst. Control. Lett., 2022
Privacy-preserving logistic regression with secret sharing.
BMC Medical Informatics Decis. Mak., 2022
Blockchain for Genomics: A Systematic Literature Review.
Distributed Ledger Technol. Res. Pract., 2022
Effectiveness and Scalability of Fuzzing Techniques in CI/CD Pipelines.
CoRR, 2022
Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Privacy-preserving Logistic Regression with Secret Sharing.
CoRR, 2021
KotlinDetector: Towards Understanding the Implications of Using Kotlin in Android Applications.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021
2020
AQUA: An Efficient Solver for the User Authorization Query Problem.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Benchmarking UAQ Solvers.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Continuous Security Testing: A Case Study on Integrating Dynamic Security Testing Tools in CI/CD Pipelines.
Proceedings of the 24th IEEE International Enterprise Distributed Object Computing Conference, 2020
2017
Formal analysis of XACML policies using SMT.
Comput. Secur., 2017
CYCLONE: The Multi-cloud Middleware Stack for Application Deployment and Management.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017
Defining Intercloud Security Framework and Architecture Components for Multi-Cloud Data Intensive Applications.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
2016
iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Cloud based big data infrastructure: Architectural components and automated provisioning.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016
An Economical Security Architecture for Multi-cloud Application Deployments in Federated Environments.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2016
On the Use of SMT Solving for XACML Policy Evaluation.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
2015
Analysis of XACML Policies with SMT.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
2014
POSTER: Analyzing Access Control Policies with SMT.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Explanations and Relaxations for Policy Conflicts in Physical Access Control.
Proceedings of the 25th IEEE International Conference on Tools with Artificial Intelligence, 2013
2012
Exploring Dynamic Constraint Enforcement and Efficiency in Access Control.
PhD thesis, 2012
Anomaly analysis for Physical Access Control security configuration.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
Efficient run-time solving of RBAC user authorization queries: pushing the envelope.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Towards Run-Time Verification in Access Control.
Proceedings of the POLICY 2011, 2011
2010
A service-based context management framework for cross-enterprise collaboration.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Reasoning about Relation Based Access Control.
Proceedings of the Fourth International Conference on Network and System Security, 2010
2008
Performance evaluation of XACML PDP implementations.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
P-CDN: Extending access control capabilities of P2P systems to provide CDN services.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Choosing Between Remote I/O versus Staging in Large Scale Distributed Applications.
Proceedings of the ISCA 21st International Conference on Parallel and Distributed Computing and Communication Systems, 2008