![]() |
|
|
ACM SIGSAC Membership Application
|
SCC'17 Table of Contents SCC'17
Chairs' Welcome The 5th International Workshop on Security in Cloud Computing (SCC'17) Organization Keynote
Address Cloud
Data Analytics for Security: Applications, Challenges, and Opportunities (Page
1) PAPER
SESSION 1 To
Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation
Verification (Page
3) Reconciling
Security and Functional Requirements in Multi-tenant Clouds (Page
11) Cloud
Storage File Recoverability (Page
19) A
Secure Algorithm for Outsourcing Matrix Multiplication Computation in
the Cloud (Page
27) |
| (Return to Top) | PAPER
SESSION 2 Efficient
Key-Rotatable and Security-Updatable Homomorphic Encryption (Page
35) Security
of Okamoto Identification Scheme - A Defense against Ephemeral Key Leakage
and Setup (Page
43) Enabling
Privacy-assured Mobile Advertisement Targeting and Dissemination (Page
51) Privacy-preserving
Hybrid Recommender System (Page
59) |
| (Return to Top) | PAPER
SESSION 3 Efficient
Implementation of a Proxy-based Protocol for Data Sharing on the Cloud (Page
67) Secure
Dot Product of Outsourced Encrypted Vectors and its Application to SVM (Page
75) A
Privacy-Preserving and Vessel Authentication Scheme Using Automatic
Identification System (Page
83) |