Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SPW
SPW 2015
Generate Citations
2015 IEEE Security and Privacy Workshops (SPW)
May 21 2015 to May 22 2015
San Jose, CA, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-vii
Message from the Chair
Freely available from IEEE.
pp. viii-ix
GenoPri 2015 Organizers
Freely available from IEEE.
pp. x-xi
LangSec 2015 Organizers
Freely available from IEEE.
pp. xii-xii
IWPE 2015 Organizers
Freely available from IEEE.
pp. xiii-xiv
Efficient Secure Outsourcing of Genome-Wide Association Studies
Freely available from IEEE.
pp. 3-6
by
Wenjie Lu
,
Yoshiji Yamada
,
Jun Sakuma
Privacy-Preserving Statistical Analysis by Exact Logistic Regression
Freely available from IEEE.
pp. 7-16
by
David A. Duverle
,
Shohei Kawasaki
,
Yoshiji Yamada
,
Jun Sakuma
,
Koji Tsuda
Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel
Freely available from IEEE.
pp. 17-26
by
Ji Young Chun
,
Hye Lim Lee
,
Ji Won Yoon
Privacy Threats and Practical Solutions for Genetic Risk Tests
Freely available from IEEE.
pp. 27-31
by
Ludovic Barman
,
Mohammed-Taha Elgraini
,
Jean Louis Raisaro
,
Jean-Pierre Hubaux
,
Erman Ayday
Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations
Freely available from IEEE.
pp. 32-40
by
Sahel Shariati Samani
,
Zhicong Huang
,
Erman Ayday
,
Mark Elliot
,
Jacques Fellay
,
Jean-Pierre Hubaux
,
Zoltán Kutalik
One Size Doesn't Fit All: Measuring Individual Privacy in Aggregate Genomic Data
Freely available from IEEE.
pp. 41-49
by
Sean Simmons
,
Bonnie Berger
Genomic Privacy Metrics: A Systematic Comparison
Freely available from IEEE.
pp. 50-59
by
Isabel Wagner
Genomic Privacy and Direct-to-Consumer Genetics: Big Consumer Genetic Data -- What's in that Contract?
Freely available from IEEE.
pp. 60-64
by
Andelka M. Phillips
Seeking a "Race to the Top" in Genomic Cloud Privacy?
Freely available from IEEE.
pp. 65-69
by
Mark Phillips
,
Bartha M. Knoppers
,
Yann Joly
The Correctness-Security Gap in Compiler Optimization
Freely available from IEEE.
pp. 73-87
by
Vijay D'Silva
,
Mathias Payer
,
Dawn Song
Grammatical Inference and Language Frameworks for LANGSEC
Freely available from IEEE.
pp. 88-98
by
Dr. Kerry N. Wood
,
Dr. Richard E. Harang
Error-Correcting Codes as Source for Decoding Ambiguity
Freely available from IEEE.
pp. 99-105
by
Adrian Dabrowski
,
Isao Echizen
,
Edgar R. Weippl
Verification State-Space Reduction through Restricted Parsing Environments
Freely available from IEEE.
pp. 106-116
by
Jacob I. Torrey
,
Mark P. Bridgman
On the Generality and Convenience of Etypes
Freely available from IEEE.
pp. 117-124
by
W. Michael Petullo
,
Joseph Suh
Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws
Freely available from IEEE.
pp. 125-133
by
Erik Poll
,
Joeri de Ruiter
,
Aleksy Schubert
Towards More Security in Data Exchange: Defining Unparsers with Context-Sensitive Encoders for Context-Free Grammars
Freely available from IEEE.
pp. 134-141
by
Lars Hermerschmidt
,
Stephan Kugelmann
,
Bernhard Rumpe
Nom, A Byte oriented, streaming, Zero copy, Parser Combinators Library in Rust
Freely available from IEEE.
pp. 142-148
by
Geoffroy Couprie
PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology
Freely available from IEEE.
pp. 151-158
by
Nicolas Notario
,
Alberto Crespo
,
Yod-Samuel Martin
,
Jose M. Del Alamo
,
Daniel Le Metayer
,
Thibaud Antignac
,
Antonio Kung
,
Inga Kroener
,
David Wright
Protection Goals for Privacy Engineering
Freely available from IEEE.
pp. 159-166
by
Marit Hansen
,
Meiko Jensen
,
Martin Rost
Privacy by Design in Federated Identity Management
Freely available from IEEE.
pp. 167-174
by
Rainer Hörbe
,
Walter Hötzendorfer
Extending the Power of Consent with User-Managed Access: A Standard Architecture for Asynchronous, Centralizable, Internet-Scalable Consent
Freely available from IEEE.
pp. 175-179
by
Eve Maler
Decentralizing Privacy: Using Blockchain to Protect Personal Data
Freely available from IEEE.
pp. 180-184
by
Guy Zyskind
,
Oz Nathan
,
Alex 'Sandy' Pentland
Reviewing for Privacy in Internet and Web Standard-Setting
Freely available from IEEE.
pp. 185-192
by
Nick Doty
Privacy Principles for Sharing Cyber Security Data
Freely available from IEEE.
pp. 193-197
by
Gina Fisk
,
Calvin Ardi
,
Neale Pickett
,
John Heidemann
,
Mike Fisk
,
Christos Papadopoulos
Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
Freely available from IEEE.
pp. 198-205
by
Jan Henrik Ziegeldorf
,
Jan Metzke
,
Martin Henze
,
Klaus Wehrle
Tor Experimentation Tools
Freely available from IEEE.
pp. 206-213
by
Fatemeh Shirazi
,
Matthias Goehring
,
Claudia Diaz
Author index
Freely available from IEEE.
pp. 215-215
[Publishers information]
Freely available from IEEE.
pp. 216-216
Showing 36 out of 36