Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/dbsec/dbsec2013.bht:"
@inproceedings{DBLP:conf/dbsec/BiskupP13, author = {Joachim Biskup and Marcel Preu{\ss}}, editor = {Lingyu Wang and Basit Shafiq}, title = {Database Fragmentation with Encryption: Under Which Semantic Constraints and {A} Priori Knowledge Can Two Keep a Secret?}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {17--32}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_2}, doi = {10.1007/978-3-642-39256-6\_2}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BiskupP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BounaCM13, author = {Bechara al Bouna and Chris Clifton and Qutaibah M. Malluhi}, editor = {Lingyu Wang and Basit Shafiq}, title = {Using Safety Constraint for Transactional Dataset Anonymization}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {164--178}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_11}, doi = {10.1007/978-3-642-39256-6\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BounaCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DongCCR13, author = {Changyu Dong and Liqun Chen and Jan Camenisch and Giovanni Russello}, editor = {Lingyu Wang and Basit Shafiq}, title = {Fair Private Set Intersection with a Semi-trusted Arbiter}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {128--144}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_9}, doi = {10.1007/978-3-642-39256-6\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/DongCCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DongLW13, author = {Boxiang Dong and Ruilin Liu and Wendy Hui Wang}, editor = {Lingyu Wang and Basit Shafiq}, title = {Result Integrity Verification of Outsourced Frequent Itemset Mining}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {258--265}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_17}, doi = {10.1007/978-3-642-39256-6\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/DongLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/FanXS13, author = {Liyue Fan and Li Xiong and Vaidy S. Sunderam}, editor = {Lingyu Wang and Basit Shafiq}, title = {Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {33--48}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_3}, doi = {10.1007/978-3-642-39256-6\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/FanXS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JainP13, author = {Rohit Jain and Sunil Prabhakar}, editor = {Lingyu Wang and Basit Shafiq}, title = {Access Control and Query Verification for Untrusted Databases}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {211--225}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_14}, doi = {10.1007/978-3-642-39256-6\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JainP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JustusCCBCC13, author = {Benjamin Justus and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien Bringer and Herv{\'{e}} Chabanne and Olivier Cipiere}, editor = {Lingyu Wang and Basit Shafiq}, title = {Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {274--281}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_19}, doi = {10.1007/978-3-642-39256-6\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JustusCCBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KerschbaumHGKSST13, author = {Florian Kerschbaum and Martin H{\"{a}}rterich and Patrick Grofig and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Lingyu Wang and Basit Shafiq}, title = {Optimal Re-encryption Strategy for Joins in Encrypted Databases}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {195--210}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_13}, doi = {10.1007/978-3-642-39256-6\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/KerschbaumHGKSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KikuchiS13, author = {Hiroaki Kikuchi and Jun Sakuma}, editor = {Lingyu Wang and Basit Shafiq}, title = {Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {145--163}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_10}, doi = {10.1007/978-3-642-39256-6\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/KikuchiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LeKJ13, author = {Meixing Le and Krishna Kant and Sushil Jajodia}, editor = {Lingyu Wang and Basit Shafiq}, title = {Rule Enforcement with Third Parties in Secure Cooperative Data Access}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {282--288}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_20}, doi = {10.1007/978-3-642-39256-6\_20}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/LeKJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LuHYDB13, author = {Haibing Lu and Yuan Hong and Yanjiang Yang and Lian Duan and Nazia Badar}, editor = {Lingyu Wang and Basit Shafiq}, title = {Towards User-Oriented {RBAC} Model}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {81--96}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_6}, doi = {10.1007/978-3-642-39256-6\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LuHYDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MitraSAV13, author = {Barsha Mitra and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Lingyu Wang and Basit Shafiq}, title = {Toward Mining of Temporal Roles}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {65--80}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_5}, doi = {10.1007/978-3-642-39256-6\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MitraSAV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/PetrlicS13, author = {Ronald Petrlic and Stephan Sekula}, editor = {Lingyu Wang and Basit Shafiq}, title = {Unlinkable Content Playbacks in a Multiparty {DRM} System}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {289--296}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_21}, doi = {10.1007/978-3-642-39256-6\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/PetrlicS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayMRH13, author = {Indrajit Ray and Dieudonne Mulamba and Indrakshi Ray and Keesook J. Han}, editor = {Lingyu Wang and Basit Shafiq}, title = {A Model for Trust-Based Access Control and Delegation in Mobile Clouds}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {242--257}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_16}, doi = {10.1007/978-3-642-39256-6\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RayMRH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ThorpeRGBF13, author = {Sean S. E. Thorpe and Indrajit Ray and Tyrone Grandison and Abbie Barbir and Robert B. France}, editor = {Lingyu Wang and Basit Shafiq}, title = {Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {97--112}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_7}, doi = {10.1007/978-3-642-39256-6\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ThorpeRGBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/TranSS13, author = {Le Minh Sang Tran and Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Lingyu Wang and Basit Shafiq}, title = {An Approach to Select Cost-Effective Risk Countermeasures}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {266--273}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_18}, doi = {10.1007/978-3-642-39256-6\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/TranSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/UzunAVS13, author = {Emre Uzun and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural}, editor = {Lingyu Wang and Basit Shafiq}, title = {Analysis of {TRBAC} with Dynamic Temporal Role Hierarchies}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {297--304}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_22}, doi = {10.1007/978-3-642-39256-6\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/UzunAVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VimercatiFJLPS13, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, editor = {Lingyu Wang and Basit Shafiq}, title = {Extending Loose Associations to Multiple Fragments}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_1}, doi = {10.1007/978-3-642-39256-6\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VimercatiFJLPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangSJJ13, author = {Zhan Wang and Kun Sun and Sushil Jajodia and Jiwu Jing}, editor = {Lingyu Wang and Basit Shafiq}, title = {TerraCheck: Verification of Dedicated Cloud Storage}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {113--127}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_8}, doi = {10.1007/978-3-642-39256-6\_8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/WangSJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangZSM13, author = {Yang Wang and Jun Zheng and Chen Sun and Srinivas Mukkamala}, editor = {Lingyu Wang and Basit Shafiq}, title = {Quantitative Security Risk Assessment of Android Permissions and Applications}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {226--241}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_15}, doi = {10.1007/978-3-642-39256-6\_15}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangZSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/YangGY13, author = {Ping Yang and Mikhail I. Gofman and Zijiang Yang}, editor = {Lingyu Wang and Basit Shafiq}, title = {Policy Analysis for Administrative Role Based Access Control without Separate Administration}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {49--64}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_4}, doi = {10.1007/978-3-642-39256-6\_4}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/YangGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Yavuz13, author = {Attila Altay Yavuz}, editor = {Lingyu Wang and Basit Shafiq}, title = {Practical Immutable Signature Bouquets {(PISB)} for Authentication and Integrity in Outsourced Databases}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {179--194}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_12}, doi = {10.1007/978-3-642-39256-6\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Yavuz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2013, editor = {Lingyu Wang and Basit Shafiq}, title = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6}, doi = {10.1007/978-3-642-39256-6}, isbn = {978-3-642-39255-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.