Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Data and Applications Security and Privacy XXVI
Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro (Eds.)
Front Matter

Invited Paper


Logics for Security and Privacy
Leendert Torre
1-7

Access Control


A User-to-User Relationship-Based Access Control Model for Online Social Networks
Yuan Cheng, Jaehong Park, Ravi Sandhu
8-24
Automated and Efficient Analysis of Role-Based Access Control with Attributes
Alessandro Armando, Silvio Ranise
25-40
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
Xin Jin, Ram Krishnan, Ravi Sandhu
41-55

Confidentiality and Privacy


Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann
56-73
Privacy Consensus in Anonymization Systems via Game Theory
Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini
74-89
Uniform Obfuscation for Location Privacy
Gianluca Dini, Pericle Perazzo
90-105

Smart Cards Security (Short Papers)


Security Vulnerabilities of User Authentication Scheme Using Smart Card
Ravi Pippal, Jaidhar C.D., Shashikala Tapaswi
106-113
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
Ding Wang, Chun-Guang Ma, Peng Wu
114-121
A friendly framework for hidding fault enabled virus for Java based smartcard
Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet
122-128

Privacy-Preserving Technologies


Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data
Robert Nix, Murat Kantarcioglu, Keesook Han
129-144
Security Limitations of Using Secret Sharing for Data Outsourcing
Jonathan Dautrich, Chinya Ravishankar
145-160
Privacy-Preserving Subgraph Discovery
Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil Adam, Vijayalakshmi Atluri
161-176

Data Management


Decentralized Semantic Threat Graphs
Simon Foley, William Fitzgerald
177-192
Code Type Revealing Using Experiments Framework
Rami Sharon, Ehud Gudes
193-206
From MDM to DB2: A Case Study of Security Enforcement Migration
Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul Run
207-222

Intrusion and Malware


XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks
Smitha Sundareswaran, Anna Squicciarini
223-238
Randomizing Smartphone Malware Profiles against Statistical Mining Techniques
Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham
239-254

Probabilistic Attacks and Protection (Short Papers)


Layered Security Architecture for Masquerade Attack Detection
Hamed Saljooghinejad, Wilson Bhukya
255-262
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing
Abbas Soodejani, Mohammad Hadavi, Rasool Jalili
263-273
Reconstruction attack through classifier analysis
Sébastien Gambs, Ahmed Gmati, Michel Hurfin
274-281

Cloud Computing


Distributed Data Federation without Disclosure of User Existence
Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga
282-297
Improving Virtualization Security by Splitting Hypervisor into Smaller Components
Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing
298-313
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios
Sabrina Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga
314-329

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/