Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

 

 

 

(Return to Top)

SCC'17 Table of Contents

SCC'17 Chairs' Welcome
Cong Wang (City University of Hong Kong)

Murat Kantarcioglu (University of Texas at Dallas)

The 5th International Workshop on Security in Cloud Computing (SCC'17) Organization


Keynote Address
Session Chair: Cong Wang (City University of Hong Kong, China)

Cloud Data Analytics for Security: Applications, Challenges, and Opportunities (Page 1)
Danfeng (Daphne) Yao (Virginia Tech)

PAPER SESSION 1
Session Chair: Lihua Wang (National Institute of Information and Communications Technology)

To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification (Page 3)
Balázs Pejó (University of Luxembourg)

Qiang Tang (Luxembourg Institute of Science and Technology)

Reconciling Security and Functional Requirements in Multi-tenant Clouds (Page 11)
Ghassan O. Karame (NEC Laboratories Europe)

Matthias Neugschwandtner (IBM Research Zurich)

Melek Önen (EURECOM)

Hubert Ritzdorf (ETH Zurich)

Cloud Storage File Recoverability (Page 19)
Christian A. Gorke (University of Mannheim)

Frederik Armknecht (University of Mannheim)

Christian Janson (Technische Universität Darmstadt)

Carlos Cid (Royal Holloway, University of London)

A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud (Page 27)
Shaojing Fu (National University of Defense Technology, State Key Laboratory of Cryptology, & Science and Technology on Information Assurance Laboratory)

Yunpeng Yu (National University of Defense Technology)

Ming Xu (National University of Defense Technology)

(Return to Top)

PAPER SESSION 2
Session Chair: Cong Wang (City University of Hong Kong)

Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption (Page 35)
Yoshinori Aono (NICT)

Takuya Hayashi (NICT)

Le Trieu Phong (NICT)

Lihua Wang (NICT)

Security of Okamoto Identification Scheme - A Defense against Ephemeral Key Leakage and Setup (Page 43)
Łukasz Krzywiecki (Wrocław University of Science and Technology)

Mirosław Kutyłowski (Wrocław University of Science and Technology)

Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination (Page 51)
Zhenkui Shi (City University of Hong Kong)

Xiaoning Liu (City University of Hong Kong)

Xingliang Yuan (City University of Hong Kong)

Privacy-preserving Hybrid Recommender System (Page 59)
Qiang Tang (Luxembourg Institute of Science and Technology)

Husen Wang (Luxembourg Institute of Science and Technology)

(Return to Top)

PAPER SESSION 3
Session Chair: Xingliang Yuan (City University of Hong Kong)

Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud (Page 67)
Maryam Sepehri (Università degli Studi di Milano)

Stelvio Cimato (Università degli Studi di Milano)

Ernesto Damiani (Khalifa University of Science)

Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM (Page 75)
Jun Zhang (The University of Hong Kong)

Xin Wang (The University of Hong Kong)

Siu-Ming Yiu (The University of Hong Kong)

Zoe L. Jiang (Harbin Institute of Technology)

Jin Li (Guangzhou University)

A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System (Page 83)
Pengchuan Su (Beijing Institute of Technology)

Nan Sun (Beijing Institute of Technology)

Liehuang Zhu (Beijing Institute of Technology)

Yandong Li (Beijing Institute of Technology)

Rongrong Bi (China National Software and Services Co. Ltd.)

Meng Li (Beijing Institute of Technology)

Zijian Zhang (Beijing Institute of Technolog)