


default search action
28. DBSec 2014: Vienna, Austria
- Vijay Atluri, Günther Pernul:

Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture Notes in Computer Science 8566, Springer 2014, ISBN 978-3-662-43935-7 - Wei Wei, Ting Yu:

Integrity Assurance for Outsourced Databases without DBMS Modification. 1-16 - Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:

Specification and Deployment of Integrated Security Policies for Outsourced Data. 17-32 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia

, Stefano Paraboschi, Pierangela Samarati
:
Optimizing Integrity Checks for Join Queries in the Cloud. 33-48 - David Derler

, Christian Hanser, Daniel Slamanig
:
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials. 49-65 - Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray:

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. 66-81 - Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi

:
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud. 82-97 - Sokratis Vavilis

, Milan Petkovic, Nicola Zannone
:
Data Leakage Quantification. 98-113 - Chu Huang, Sencun Zhu, Robert F. Erbacher:

Toward Software Diversity in Heterogeneous Networked Systems. 114-129 - Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser:

FSquaDRA: Fast Detection of Repackaged Applications. 130-145 - Rasib Khan, Shams Zawoad, Md Munirul Haque, Ragib Hasan

:
'Who, When, and Where?' Location Proof Assertion for Mobile Devices. 146-162 - Pooya Mehregan, Philip W. L. Fong:

Design Patterns for Multiple Stakeholders in Social Computing. 163-178 - Yuan Hong

, Jaideep Vaidya, Haibing Lu, Lingyu Wang:
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. 179-194 - Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray:

ELITE: zEro Links Identity managemenT systEm. 195-210 - Haibing Lu, Yuan Hong

, Yanjiang Yang, Yi Fang, Lian Duan
:
Dynamic Workflow Adjustment with Security Constraints. 211-226 - Meixing Le, Krishna Kant, Sushil Jajodia

:
Consistent Query Plan Generation in Secure Cooperative Data Access. 227-242 - Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy

:
Hunting the Unknown - White-Box Database Leakage Detection. 243-259 - Silvio Ranise

, Anh Tuan Truong:
Incremental Analysis of Evolving Administrative Role Based Access Control Policies. 260-275 - Zhongyuan Xu, Scott D. Stoller:

Mining Attribute-Based Access Control Policies from Logs. 276-291 - Yuan Cheng

, Jaehong Park, Ravi S. Sandhu:
Attribute-Aware Relationship-Based Access Control for Online Social Networks. 292-306 - Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, Ramarathnam Venkatesan:

Randomly Partitioned Encryption for Cloud Databases. 307-323 - Michael G. Solomon, Vaidy S. Sunderam, Li Xiong

:
Towards Secure Cloud Database with Fine-Grained Access Control. 324-338 - Giovanni Di Crescenzo, Debra L. Cook, Allen McIntosh, Euthimios Panagos:

Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database. 339-355 - Wonkyu Han, Hongxin Hu, Gail-Joon Ahn

:
LPM: Layered Policy Management for Software-Defined Networks. 356-363 - Giovanni Di Crescenzo, David Shallcross:

On Minimizing the Size of Encrypted Databases. 364-372 - Michal Davidson, Ehud Gudes, Tamir Tassa:

Efficient and Enhanced Solutions for Content Sharing in DRM Systems. 373-381 - Vikas G. Ashok, Ravi Mukkamala:

A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters. 382-389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














