index - Data and Applications Security and Privacy XXIV Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Data and Applications Security and Privacy XXIV
Sara Foresti, Sushil Jajodia
Front Matter

Query and Data Privacy


Generalizing PIR for Practical Private Retrieval of Public Data
Shiyuan Wang, Divyakant Agrawal, Amr Abbadi
1-16
A Logic of Privacy
Steve Barker, Valerio Genovese
17-32
Understanding Privacy Risk of Publishing Decision Trees
Zutao Zhu, Wenliang Du
33-48

Data Protection


Secure Outsourcing of DNA Searching via Finite Automata
Marina Blanton, Mehrdad Aliasgari
49-64
A Labelling System for Derived Data Control
Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu
65-80
On the Identification of Property Based Generalizations in Microdata Anonymization
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley
81-96

Access Control


Role Mining in the Presence of Noise
Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu
97-112
Distributed and Secure Access Control in P2P Databases
Angela Bonifati, Ruilin Liu, Hui (wendy) Wang
113-129
Constructing Key Assignment Schemes from Chain Partitions
Jason Crampton, Rosli Daud, Keith M. Martin
130-145

Data Confidentiality and Query Verification


fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality
Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci
146-161
Efficient Inference Control for Open Relational Queries
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner
162-176
Query Racing: Fast Completeness Certification of Query Results
Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco
177-192

Policy Definition and Enforcement


Mining Likely Properties of Access Control Policies via Association Rule Mining
Jeehyun Hwang, Tao Xie, Vincent Hu, Mine Altunay
193-208
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham
209-224
Enforcing Request Integrity in Web Applications
Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin
225-240

Trust and Identity Management


Using Trust-Based Information Aggregation for Predicting Security Level of Systems
Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray
241-256
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms
Aarthi Nagarajan, Vijay Varadharajan
257-272
Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms
Jan Zibuschka, Matthias Herbert, Heiko Roßnagel
273-286

Short Papers


An Access Control Model for Web Databases
Ahlem Bouchahda-Ben Tekaya, Nhan Thanh, Adel Bouhoula, Faten Labbene-Ayachi
287-294
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Hasan Qunoo, Mark Ryan
295-302
Evaluating the Risk of Adopting RBAC Roles
Alessandro Colantonio, Roberto Pietro, Alberto Ocello, Nino Vincenzo Verde
303-310
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Amril Syalim, Takashi Nishide, Kouichi Sakurai
311-318
When ABE Meets RSS
Yu Chen, Hyun Sung Kim, Jianbin Hu, Zhong Chen
319-326
PriMan : A Privacy-Preserving Identity Framework
Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart Decker
327-334
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach
Alex Hai Wang
335-342
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach
Ramaswamy Chandramouli
343-349
A Secure RFID Ticket System for Public Transport
Kun Peng, Feng Bao
350-357
Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols
Suratose Tritilanunt
358-365
Secure Location Verification
Georg T. Becker, Sherman C. Lo, David S. Lorenzo, Per K. Enge, Christof Paar
366-373