Security and Privacy

Contents: Introduction. Part I Identity, Security and Privacy in Context: Designing for trust, L. Jean Camp The digital persona and its application to data surveillance, Roger Clarke Privacy, visibility, transparency, and exposure, Julie E. Cohen Exploring identity and identification in cyberspace, Oscar H. Gandy, Jr A contextual approach to privacy online, Helen Nissenbaum. Part II Surveillance, Security and Anonymity: Hacking the Panopticon: distributed online surveillance and resistance, Benoit Dupont The surveillant assemblage, Kevin D. Haggerty and Richard V. Ericson 'Sousveillance': inverse surveillance in multimedia imaging, Steve Mann Surveillance as cultural practice, Torin Monahan Surveillance and security: a dodgy relationship, Walter Peissl Counter-surveillance as political intervention?, Torin Monahan Resistance against cyber-surveillance within social movements and how surveillance adapts, Oliver Leistert Privacy, surveillance, and law, Richard A. Posner Squaring the circle of smart surveillance and privacy, Joseph A. Cannataci. Part III Privacy, Data Protection and Security: Data protection pursuant to the right to privacy in human rights treaties, Lee A. Bygrave Consumer culture and the commodification of policing and security, Ian Loader Information technology and dataveillance, Roger A. Clarke Public assessment of new surveillance-oriented security technologies: beyond the trade-off between privacy and security, Vincenzo Pavone and Sara Degli Esposti European protectionism in cloud computing: addressing concerns over the PATRIOT Act, John T. Billings Internet intermediaries, cloud computing and geospatial data: how competition and privacy converge in the mobile environment, Lisa Madelon Campbell Stolen identities, Jennifer Whitson and Kevin D. Haggerty. Part IV Smart Technologies, Social Control and Human Rights: The body as data? Biobank regulation via the 'back door' of data protection law, Lee A. Bygrave CCTV policy in the UK: reconsidering the evidence base, William Webster Camera surveillance within the UK: enhancing public safety or a social threat?, Barrie Sheldon Privacy and data protection at the time of facial recognition: towards a new right to digital identity?, Shara Monteleone The deciders: the future of privacy and free speech in the age of Facebook and Google, Jeffrey Rosen Affordance, conventions, and design, Donald A. Norman eHealth: roadmap to finding a successful cure for privacy issues, Deborah C. Peel There's no app for that: protecting users from mobile service providers and developers of location-based applications, Daniel L. Pieringer The Privacy Bill of Rights: what are the expectations for 2013?, Christopher Wolf. Name index.

[1]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[2]  Elisa Bertino,et al.  TRBAC: a temporal role-based access control model , 2000, RBAC '00.

[3]  Vijay Laxmi,et al.  MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).

[4]  Vijay Laxmi,et al.  AndroSimilar: robust statistical feature signature for Android malware detection , 2013, SIN.

[5]  Manachai Toahchoodee,et al.  A Spatio-temporal Role-Based Access Control Model , 2007, DBSec.

[6]  Ming Zeng,et al.  Adaptive activity recognition with dynamic heterogeneous sensor fusion , 2014, 6th International Conference on Mobile Computing, Applications and Services.

[7]  Shamik Sural,et al.  Role Based Access Control with Spatiotemporal Context for Mobile Applications , 2009, Trans. Comput. Sci..

[8]  Yuval Elovici,et al.  “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.

[9]  Yanfang Ye,et al.  Deep Neural Networks for Automatic Android Malware Detection , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[10]  Zhang Yi,et al.  Some multistability properties of bidirectional associative memory recurrent neural networks with unsaturating piecewise linear transfer functions , 2009, Neurocomputing.

[11]  David F. Ferraiolo,et al.  Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .

[12]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[13]  Vijay Laxmi,et al.  Secure and efficient proof of ownership for deduplicated cloud storage , 2017, SIN.

[14]  Vijay Laxmi,et al.  Android component vulnerabities: Proof of concepts and mitigation , 2016, 2016 International Conference on Information Networking (ICOIN).

[15]  Peter J. Denning,et al.  Protection: principles and practice , 1972, AFIPS '72 (Spring).

[16]  Patrick Traynor,et al.  A Large Scale Investigation of Obfuscation Use in Google Play , 2018, ACSAC.

[17]  Zhenlong Yuan,et al.  Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.

[18]  Vijay Laxmi,et al.  Secure Random Encryption for Deduplicated Storage , 2017, ICISS.

[19]  Xin Jin,et al.  A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.

[20]  Muhammad Awais Shibli,et al.  Towards Attribute-Centric Access Control: an ABAC versus RBAC argument , 2016, Secur. Commun. Networks.

[21]  Mauro Conti,et al.  Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models , 2014, ESORICS.

[22]  Jay Dave,et al.  Securing SQL with Access Control for Database as a Service Model , 2016, ICTCS.

[23]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[24]  Konstantin Berlin,et al.  Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).

[25]  Vijay Laxmi,et al.  DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.

[26]  Xin Jin,et al.  RABAC: Role-Centric Attribute-Based Access Control , 2012, MMM-ACNS.

[27]  Xiong Luo,et al.  Access Control Model Based on Role and Attribute and Its Implementation , 2016, 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[28]  Wei Li,et al.  TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[29]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[30]  Muttukrishnan Rajarajan,et al.  Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[31]  Juan E. Tapiador,et al.  Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.

[32]  Gianluca Stringhini,et al.  Eight Years of Rider Measurement in the Android Malware Ecosystem , 2018, IEEE Transactions on Dependable and Secure Computing.

[33]  Vijayalakshmi Atluri,et al.  Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing , 2015, NSS.

[34]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[35]  David M. Nicol,et al.  A framework integrating attribute-based policies into role-based access control , 2012, SACMAT '12.

[36]  Sylvia L. Osborn,et al.  Current Research and Open Problems in Attribute-Based Access Control , 2017, ACM Comput. Surv..

[37]  Ram Krishnan,et al.  Attributes Enhanced Role-Based Access Control Model , 2015, TrustBus.

[38]  Pietro Iglio,et al.  Role templates for content-based access control , 1997, RBAC '97.

[39]  D. Richard Kuhn,et al.  Adding Attributes to Role-Based Access Control , 2010, Computer.

[40]  Mansour Ahmadi,et al.  DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware , 2017, CODASPY.