• Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, and Refik Molva. “Publicly Verifiable Conjunctive Keyword Search in Outsourced Databases.” 1st IEEE International workshop on Security and Privacy in the Cloud (SPC 2015), Florence, Italy. 30 September 2015. [ Online DOI ]

  • Malik Imran Daud, David Sánchez and Alexandre Viejo. "Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile". Lecture Notes in Computer Science, Vol. 9264 (Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015), pp. 18-29, Aug 2015, ISSN: 0302-9743. [Online PDF]

  • Mercedes Rodriguez-Garcia, Montserrat Batet and David Sánchez. "Semantic Noise: Privacy-protection of Nominal Microdata through Uncorrelated Noise Addition". 27th International Conference on Tools with Artificial Intelligence - ICTAI 2015, Vietri Sul Mare, Italy, November 2015 [ Online PDF ]

  • Aida Calviño, Sara Ricci and Josep Domingo-Ferrer, "Privacy-preserving distributed statistical computation to a semi-honest multi-cloud", 1st IEEE Workshop on Security and Privacy in the Cloud-SPC 2015, Florence, Italy, September 2015. [Online PDF]

  • Josep Domingo-Ferrer, Sara Ricci and Jordi Soria-Comas. "Disclosure risk assessment via record linkage by a maximum-knowledge attacker". 13th Annual International Conference on Privacy, Security and Trust-PST 2015, Izmir, Turkey, September 2015 [Online PDF]

  • David Sánchez and Montserrat Batet. C-sanitized: A privacy model for document redaction and sanitization. Journal of the Association for Information Science and Technology. Volume 67, Issue 1, pages 148–163, January 2016. [Online: arXiv | DOI]

  • Alexandre Viejo and David Sánchez. Enforcing Transparent Access to Private Content in Social Networks by Means of Automatic Sanitization. Expert Systems with Applications, Vol. 42, pp. 9366-9378, Aug 2015, ISSN: 0957-4174. [ Online: arXiv | DOI ]

  • David Sánchez, Josep Domingo-Ferrer, Sergio Martínez, and Jordi Soria-Comas. Utility-Preserving Differentially Private Data Releases Via Individual Ranking Microaggregation. Information Fusion vol 30, pp. 1-14. Jan 2016. [ Online: arXiv | DOI ]

  • Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez and Sergio Martínez, t-Closeness through microaggregation: strict privacy with enhanced utility preservation. IEEE Transactions on Knowledge and Data Engineering, Vol. 27, no. 11, pp. 3098-3110, Oct 2015, ISSN: 1041-4347. [ Online: arXiv | DOI ]

  • Jason Crampton, Naomi Farley, Gregory Gutin and Mark Jones. “Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies.” 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec) 2015, Fairfax, VA, USA. July 13-15, 2015