default search action
27. DBSec 2013: Newark, NJ, USA
- Lingyu Wang, Basit Shafiq:
Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings. Lecture Notes in Computer Science 7964, Springer 2013, ISBN 978-3-642-39255-9
Privacy I
- Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Extending Loose Associations to Multiple Fragments. 1-16 - Joachim Biskup, Marcel Preuß:
Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret? 17-32 - Liyue Fan, Li Xiong, Vaidy S. Sunderam:
Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring. 33-48
Access Control
- Ping Yang, Mikhail I. Gofman, Zijiang Yang:
Policy Analysis for Administrative Role Based Access Control without Separate Administration. 49-64 - Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Toward Mining of Temporal Roles. 65-80 - Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar:
Towards User-Oriented RBAC Model. 81-96
Cloud Computing
- Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France:
Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations. 97-112 - Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
TerraCheck: Verification of Dedicated Cloud Storage. 113-127
Privacy II
- Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. 128-144 - Hiroaki Kikuchi, Jun Sakuma:
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection. 145-163 - Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Using Safety Constraint for Transactional Dataset Anonymization. 164-178
Data Outsourcing
- Attila Altay Yavuz:
Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases. 179-194 - Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Optimal Re-encryption Strategy for Joins in Encrypted Databases. 195-210 - Rohit Jain, Sunil Prabhakar:
Access Control and Query Verification for Untrusted Databases. 211-225
Mobile Computing
- Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala:
Quantitative Security Risk Assessment of Android Permissions and Applications. 226-241 - Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han:
A Model for Trust-Based Access Control and Delegation in Mobile Clouds. 242-257
Short Papers
- Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Frequent Itemset Mining. 258-265 - Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen:
An Approach to Select Cost-Effective Risk Countermeasures. 266-273 - Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere:
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase. 274-281 - Meixing Le, Krishna Kant, Sushil Jajodia:
Rule Enforcement with Third Parties in Secure Cooperative Data Access. 282-288 - Ronald Petrlic, Stephan Sekula:
Unlinkable Content Playbacks in a Multiparty DRM System. 289-296 - Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Analysis of TRBAC with Dynamic Temporal Role Hierarchies. 297-304
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.