Secure graph analysis at scale

T Araki, J Furukawa, K Ohara, B Pinkas… - … Security, 2021 - dl.acm.org
… is the secure analysis of large-scale data that is represented as a graph. In particular, the …
We present new techniques that can scale the secure computation of graph data to very large …

Toward scalable graph-based security analysis for cloud networks

A Sabur, A Chowdhary, D Huang, A Alshamrani - Computer Networks, 2022 - Elsevier
graph output extremely huge and difficult to analyze by the system administrator. Furthermore,
AG is used for graphical security analysisanalysis of the proposed algorithm, S3 scales

Small worlds in security systems: an analysis of the PGP certificate graph

S Čapkun, L Buttyán, JP Hubaux - … the 2002 workshop on New security …, 2002 - dl.acm.org
graphs of self-organized security systems will exhibit a similar small-world phenomenon, and
we provide a way to model self-organized certificate graphs. … scaling as the PGP certificate …

Scalable, graph-based network vulnerability analysis

P Ammann, D Wijesekera, S Kaushik - … and Communications Security, 2002 - dl.acm.org
… ’s goal, and an attack graph as a consolidation of the attack tree … graphs can easily be far
too large to be practical. Paper [13] provides some support for our position on this: in a scaling

[PDF][PDF] A scalable approach to analyzing network security using compact attack graphs

F Chen, D Liu, Y Zhang, J Su - Journal of Networks, 2010 - Citeseer
… The approach is proved to have a polynomial time complexity and can scale to the attack
graphs with ten thousands of nodes corresponding large enterprise networks. …

Graphiti: Secure Graph Computation Made More Scalable

N Koti, VB Kukkala, A Patra, B Raj Gopal - … and Communications Security, 2024 - dl.acm.org
graph analysis without leaking the global graph data in the clear. The current work focuses
on addressing this via the technique of secure … phase of BFS scales with the graph size N. …

A large-scale data security detection method based on continuous time graph embedding framework

Z Liu, W Che, S Wang, J Xu, H Yin - Journal of Cloud Computing, 2023 - Springer
… -scale graphs. To ensure the accuracy of prediction models and improve the security of
large-scale data during processing [22], this paper proposes a continuous-time dynamic graph

Privacy-Preserving Graph Analysis

B Raj Gopal - … on Computer and Communications Security, 2024 - dl.acm.org
… MPC protocols tailored for graph computations. Thus, this … based solutions for secure graph
analysis in both outsourced … for secure graph analysis does not scale well for large graphs

Graphsc: Parallel secure computation made easy

K Nayak, XS Wang, S Ioannidis… - … on security and …, 2015 - ieeexplore.ieee.org
secure version of graph-based algorithms incurs a small logarithmic overhead in comparison
with the non-secure … can bring secure computation into the realm of practical large-scale

A novel privacy preserving framework for large scale graph data publishing

X Ding, C Wang, KKR Choo… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
… of secure graph storage, fast anonymization and efficient query processing. In addition, any
third-party can perform graph mining and related analysis over the anonymized graph directly…