Search dblp for Publications

export results for "toc:db/conf/dbsec/dbsec2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dbsec/AdaikkalavanRX11,
  author       = {Raman Adaikkalavan and
                  Indrakshi Ray and
                  Xing Xie},
  editor       = {Yingjiu Li},
  title        = {Multilevel Secure Data Stream Processing},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_11},
  doi          = {10.1007/978-3-642-22348-8\_11},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AdaikkalavanRX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Al-SinaniM11,
  author       = {Haitham S. Al{-}Sinani and
                  Chris J. Mitchell},
  editor       = {Yingjiu Li},
  title        = {Enhancing CardSpace Authentication Using a Mobile Device},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_16},
  doi          = {10.1007/978-3-642-22348-8\_16},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Al-SinaniM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AucherBBGT11,
  author       = {Guillaume Aucher and
                  Steve Barker and
                  Guido Boella and
                  Valerio Genovese and
                  Leendert W. N. van der Torre},
  editor       = {Yingjiu Li},
  title        = {Dynamics in Delegation and Revocation Schemes: {A} Logical Approach},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {90--105},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_9},
  doi          = {10.1007/978-3-642-22348-8\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AucherBBGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BerheDGPS11,
  author       = {Solomon Berhe and
                  Steven A. Demurjian and
                  Swapna S. Gokhale and
                  Jaime A. Pavlich{-}Mariscal and
                  Rishi Saripalle},
  editor       = {Yingjiu Li},
  title        = {Leveraging {UML} for Security Engineering and Enforcement in a Collaboration
                  on Duty and Adaptive Workflow Model That Extends {NIST} {RBAC}},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {293--300},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_25},
  doi          = {10.1007/978-3-642-22348-8\_25},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BerheDGPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Biskup11,
  author       = {Joachim Biskup},
  editor       = {Yingjiu Li},
  title        = {History-Dependent Inference Control of Queries by Dynamic Policy Adaption},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {106--121},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_10},
  doi          = {10.1007/978-3-642-22348-8\_10},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Biskup11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChenLC11,
  author       = {Yu Chen and
                  Song Luo and
                  Zhong Chen},
  editor       = {Yingjiu Li},
  title        = {A New Leakage-Resilient {IBE} Scheme in the Relative Leakage Model},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {263--270},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_22},
  doi          = {10.1007/978-3-642-22348-8\_22},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChenLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CirianiVFLS11,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Giovanni Livraga and
                  Pierangela Samarati},
  editor       = {Yingjiu Li},
  title        = {Enforcing Confidentiality and Data Visibility Constraints: An {OBDD}
                  Approach},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {44--59},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_6},
  doi          = {10.1007/978-3-642-22348-8\_6},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/CirianiVFLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DuTLJZ11,
  author       = {Wenliang Du and
                  Xi Tan and
                  Tongbo Luo and
                  Karthick Jayaraman and
                  Zutao Zhu},
  editor       = {Yingjiu Li},
  title        = {Re-designing the Web's Access Control System - (Extended Abstract)},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {4--11},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_2},
  doi          = {10.1007/978-3-642-22348-8\_2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/DuTLJZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DuttAG11,
  author       = {Varun Dutt and
                  Young{-}Suk Ahn and
                  Cleotilde Gonzalez},
  editor       = {Yingjiu Li},
  title        = {Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack
                  Scenario through Instance-Based Learning},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {280--292},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_24},
  doi          = {10.1007/978-3-642-22348-8\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/DuttAG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FrikkenL11,
  author       = {Keith B. Frikken and
                  Boyang Li},
  editor       = {Yingjiu Li},
  title        = {Private Database Search with Sublinear Query Time},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_13},
  doi          = {10.1007/978-3-642-22348-8\_13},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/FrikkenL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HongVL11,
  author       = {Yuan Hong and
                  Jaideep Vaidya and
                  Haibing Lu},
  editor       = {Yingjiu Li},
  title        = {Efficient Distributed Linear Programming with Limited Disclosure},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {170--185},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_14},
  doi          = {10.1007/978-3-642-22348-8\_14},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/HongVL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HuA11,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn},
  editor       = {Yingjiu Li},
  title        = {Multiparty Authorization Framework for Data Sharing in Online Social
                  Networks},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {29--43},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_5},
  doi          = {10.1007/978-3-642-22348-8\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HuA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JiangS11,
  author       = {Wei Jiang and
                  Bharath K. Samanthula},
  editor       = {Yingjiu Li},
  title        = {N-Gram Based Secure Similar Document Detection},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {239--246},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_19},
  doi          = {10.1007/978-3-642-22348-8\_19},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/JiangS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Kerschbaum11,
  author       = {Florian Kerschbaum},
  editor       = {Yingjiu Li},
  title        = {Public-Key Encrypted Bloom Filters with Applications to Supply Chain
                  Integrity},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {60--75},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_7},
  doi          = {10.1007/978-3-642-22348-8\_7},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Kerschbaum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KopylovaFX11,
  author       = {Yuliya Kopylova and
                  Csilla Farkas and
                  Wenyuan Xu},
  editor       = {Yingjiu Li},
  title        = {Accurate Accident Reconstruction in {VANET}},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {271--279},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_23},
  doi          = {10.1007/978-3-642-22348-8\_23},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/KopylovaFX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LeKJ11,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  editor       = {Yingjiu Li},
  title        = {Cooperative Data Access in Multi-cloud Environments},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_4},
  doi          = {10.1007/978-3-642-22348-8\_4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LeKJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LeiF11,
  author       = {Hao Lei and
                  Dengguo Feng},
  editor       = {Yingjiu Li},
  title        = {Selective Disclosure on Encrypted Documents},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {255--262},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_21},
  doi          = {10.1007/978-3-642-22348-8\_21},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LeiF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LiLLL11,
  author       = {Chun{-}Ta Li and
                  Cheng{-}Chi Lee and
                  Chen{-}Ju Liu and
                  Chin{-}Wen Lee},
  editor       = {Yingjiu Li},
  title        = {A Robust Remote User Authentication Scheme against Smart Card Security
                  Breach},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {231--238},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_18},
  doi          = {10.1007/978-3-642-22348-8\_18},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LiLLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MiyajiR11,
  author       = {Atsuko Miyaji and
                  Mohammad Shahriar Rahman},
  editor       = {Yingjiu Li},
  title        = {Privacy-Preserving Data Mining: {A} Game-Theoretic Approach},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_15},
  doi          = {10.1007/978-3-642-22348-8\_15},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MiyajiR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/NergizC11,
  author       = {Ahmet Erhan Nergiz and
                  Chris Clifton},
  editor       = {Yingjiu Li},
  title        = {Query Processing in Private Data Outsourcing Using Anonymization},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_12},
  doi          = {10.1007/978-3-642-22348-8\_12},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/NergizC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Paraboschi11,
  author       = {Stefano Paraboschi},
  editor       = {Yingjiu Li},
  title        = {Integrated Management of Security Policies},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {12--13},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_3},
  doi          = {10.1007/978-3-642-22348-8\_3},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Paraboschi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Peng11,
  author       = {Kun Peng},
  editor       = {Yingjiu Li},
  title        = {Verifiable Secret Sharing with Comprehensive and Efficient Public
                  Verification},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {217--230},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_17},
  doi          = {10.1007/978-3-642-22348-8\_17},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SchimkeKH11,
  author       = {Nakeisha Schimke and
                  Mary Kuehler and
                  John Hale},
  editor       = {Yingjiu Li},
  title        = {Preserving Privacy in Structural Neuroimages},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {301--308},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_26},
  doi          = {10.1007/978-3-642-22348-8\_26},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/SchimkeKH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Sekar11,
  author       = {R. Sekar},
  editor       = {Yingjiu Li},
  title        = {Information Flow Containment: {A} Practical Basis for Malware Defense},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_1},
  doi          = {10.1007/978-3-642-22348-8\_1},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Sekar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SteeleF11,
  author       = {Aaron Steele and
                  Keith B. Frikken},
  editor       = {Yingjiu Li},
  title        = {An Index Structure for Private Data Outsourcing},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {247--254},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_20},
  doi          = {10.1007/978-3-642-22348-8\_20},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/SteeleF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/UzunALV11,
  author       = {Emre Uzun and
                  Vijayalakshmi Atluri and
                  Haibing Lu and
                  Jaideep Vaidya},
  editor       = {Yingjiu Li},
  title        = {An Optimization Model for the Extended Role Mining Problem},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {76--89},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_8},
  doi          = {10.1007/978-3-642-22348-8\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/UzunALV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2011,
  editor       = {Yingjiu Li},
  title        = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8},
  doi          = {10.1007/978-3-642-22348-8},
  isbn         = {978-3-642-22347-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics