index - Data and Applications Security and Privacy XXVI Access content directly
   


Full Text Documents

24

Search


Table of Contents
Data and Applications Security and Privacy XXVI
Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro (Eds.)
Front Matter

Invited Paper


Logics for Security and Privacy
Leendert Torre
1-7

Access Control


A User-to-User Relationship-Based Access Control Model for Online Social Networks
Yuan Cheng, Jaehong Park, Ravi Sandhu
8-24
Automated and Efficient Analysis of Role-Based Access Control with Attributes
Alessandro Armando, Silvio Ranise
25-40
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
Xin Jin, Ram Krishnan, Ravi Sandhu
41-55

Confidentiality and Privacy


Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann
56-73
Privacy Consensus in Anonymization Systems via Game Theory
Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini
74-89
Uniform Obfuscation for Location Privacy
Gianluca Dini, Pericle Perazzo
90-105

Smart Cards Security (Short Papers)


Security Vulnerabilities of User Authentication Scheme Using Smart Card
Ravi Pippal, Jaidhar C.D., Shashikala Tapaswi
106-113
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
Ding Wang, Chun-Guang Ma, Peng Wu
114-121
A friendly framework for hidding fault enabled virus for Java based smartcard
Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet
122-128

Privacy-Preserving Technologies


Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data
Robert Nix, Murat Kantarcioglu, Keesook Han
129-144
Security Limitations of Using Secret Sharing for Data Outsourcing
Jonathan Dautrich, Chinya Ravishankar
145-160
Privacy-Preserving Subgraph Discovery
Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil Adam, Vijayalakshmi Atluri
161-176

Data Management


Decentralized Semantic Threat Graphs
Simon Foley, William Fitzgerald
177-192
Code Type Revealing Using Experiments Framework
Rami Sharon, Ehud Gudes
193-206
From MDM to DB2: A Case Study of Security Enforcement Migration
Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul Run
207-222

Intrusion and Malware


XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks
Smitha Sundareswaran, Anna Squicciarini
223-238
Randomizing Smartphone Malware Profiles against Statistical Mining Techniques
Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham
239-254

Probabilistic Attacks and Protection (Short Papers)


Layered Security Architecture for Masquerade Attack Detection
Hamed Saljooghinejad, Wilson Bhukya
255-262
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing
Abbas Soodejani, Mohammad Hadavi, Rasool Jalili
263-273
Reconstruction attack through classifier analysis
Sébastien Gambs, Ahmed Gmati, Michel Hurfin
274-281

Cloud Computing


Distributed Data Federation without Disclosure of User Existence
Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga
282-297
Improving Virtualization Security by Splitting Hypervisor into Smaller Components
Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing
298-313
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios
Sabrina Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga
314-329

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/