


default search action
29. DBSec 2015: Fairfax, VA, USA
- Pierangela Samarati

:
Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings. Lecture Notes in Computer Science 9149, Springer 2015, ISBN 978-3-319-20809-1
Data Anonymization and Computation
- Neelam Memon, Jianhua Shao:

MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce. 3-18 - Mingyi Zhao, Peng Liu, Jorge Lobo

:
Towards Collaborative Query Planning in Multi-party Database Networks. 19-34 - Giovanni Di Crescenzo, Abhrajit Ghosh:

Privacy-Preserving Range Queries from Keyword Queries. 35-50
Access Control and Authorization
- Scott D. Stoller:

An Administrative Model for Relationship-Based Access Control. 53-68 - Emre Uzun, David Lorenzi, Vijayalakshmi Atluri

, Jaideep Vaidya, Shamik Sural
:
Migrating from DAC to RBAC. 69-84 - Daniel Ricardo dos Santos

, Silvio Ranise
, Luca Compagna, Serena Elisa Ponta:
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios. 85-100
User Privacy
- Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia:

Privacy Preserving Record Matching Using Automated Semi-trusted Broker. 103-118 - Hu Chun, Kui Ren

, Wei Jiang:
Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid. 119-134 - Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker:

Privacy-Preserving Public Transport Ticketing System. 135-150
Authentication and Information Integration
- Stephen R. Tate, Roopa Vishwanathan:

Expiration and Revocation of Keys for Attribute-Based Signatures. 153-169 - Euijin Choo, Ting Yu, Min Chi:

Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis. 170-187 - Joachim Biskup, Cornelia Tadros:

Constructing Inference-Proof Belief Mediators. 188-203
Privacy and Trust
- Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul:

Personalized Composition of Trustful Reputation Systems. 207-214 - Jamuna Gopal, Shu Huang, Bo Luo

:
FamilyID: A Hybrid Approach to Identify Family Information from Microblogs. 215-222 - Mohammad Alaggan

, Sébastien Gambs, Stan Matwin
, Mohammed Tuhin:
Sanitization of Call Detail Records via Differentially-Private Bloom Filters. 223-230
Access Control and Usage Policies
- Annanda Thavymony Rath, Jean-Noël Colin

:
Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System. 233-241 - Qasim Mahmood Rajpoot, Christian Damsgaard Jensen

, Ram Krishnan
:
Integrating Attributes into Role-Based Access Control. 242-249 - Prachi Kumari, Alexander Pretschner:

Automated Translation of End User Policies for Usage Control Enforcement. 250-258
Network and Internet Security
- Assane Gueye

, Peter Mell, Richard E. Harang, Richard J. La:
Defensive Resource Allocations with Security Chokepoints in IPv6 Networks. 261-276 - Igor Mishsky, Nurit Gal-Oz, Ehud Gudes:

A Topology Based Flow Model for Computing Domain Reputation. 277-292 - Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam:

FPGuard: Detection and Prevention of Browser Fingerprinting. 293-308
Information Flow and Inference
- Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose F. Gamble:

Stream Processing with Secure Information Flow Constraints. 311-329 - Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones:

Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies. 330-345 - Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid:

Inference Leakage Detection for Authorization Policies over RDF Data. 346-361

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














