default search action
24. DBSec 2010: Rome, Italy
- Sara Foresti, Sushil Jajodia:
Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6166, Springer 2010, ISBN 978-3-642-13738-9
Query and Data Privacy
- Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi:
Generalizing PIR for Practical Private Retrieval of Public Data. 1-16 - Steve Barker, Valerio Genovese:
A Logic of Privacy. 17-32 - Zutao Zhu, Wenliang Du:
Understanding Privacy Risk of Publishing Decision Trees. 33-48
Data Protection
- Marina Blanton, Mehrdad Aliasgari:
Secure Outsourcing of DNA Searching via Finite Automata. 49-64 - Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu:
A Labelling System for Derived Data Control. 65-80 - Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
On the Identification of Property Based Generalizations in Microdata Anonymization. 81-96
Access Control
- Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Role Mining in the Presence of Noise. 97-112 - Angela Bonifati, Ruilin Liu, Wendy Hui Wang:
Distributed and Secure Access Control in P2P Databases. 113-129 - Jason Crampton, Rosli Daud, Keith M. Martin:
Constructing Key Assignment Schemes from Chain Partitions. 130-145
Data Confidentiality and Query Veri?cation
- Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality. 146-161 - Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner:
Efficient Inference Control for Open Relational Queries. 162-176 - Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco:
Query Racing: Fast Completeness Certification of Query Results. 177-192
Policy Definition and Enforcement
- JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay:
Mining Likely Properties of Access Control Policies via Association Rule Mining. 193-208 - Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham:
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. 209-224 - Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin:
Enforcing Request Integrity in Web Applications. 225-240
Trust and Identity Management
- Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray:
Using Trust-Based Information Aggregation for Predicting Security Level of Systems. 241-256 - Aarthi Nagarajan, Vijay Varadharajan:
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. 257-272 - Jan Zibuschka, Matthias Herbert, Heiko Rossnagel:
Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms. 273-286
Short Papers
- Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene Ayachi:
An Access Control Model for Web Databases. 287-294 - Hasan Qunoo, Mark Ryan:
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems. 295-302 - Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Evaluating the Risk of Adopting RBAC Roles. 303-310 - Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. 311-318 - Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen:
When ABE Meets RSS. 319-326 - Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker:
PriMan : A Privacy-Preserving Identity Framework. 327-334 - Alex Hai Wang:
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. 335-342 - Ramaswamy Chandramouli:
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach. 343-349 - Kun Peng, Feng Bao:
A Secure RFID Ticket System for Public Transport. 350-357 - Suratose Tritilanunt:
Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols. 358-365 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar:
Secure Location Verification - A Security Analysis of GPS Signal Authentication. 366-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.