Search dblp for Publications

export results for "toc:db/conf/dbsec/dbsec2007.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dbsec/AmanatidisBO07,
  author       = {Georgios Amanatidis and
                  Alexandra Boldyreva and
                  Adam O'Neill},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Provably-Secure Schemes for Basic Query Support in Outsourced Databases},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {14--30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_2},
  doi          = {10.1007/978-3-540-73538-0\_2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AmanatidisBO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ArdagnaCDVS07,
  author       = {Claudio A. Ardagna and
                  Marco Cremonini and
                  Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Location Privacy Protection Through Obfuscation-Based Techniques},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {47--60},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_4},
  doi          = {10.1007/978-3-540-73538-0\_4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ArdagnaCDVS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriS07,
  author       = {Vijayalakshmi Atluri and
                  Heechang Shin},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Efficient Security Policy Enforcement in a Location Based Service
                  Environment},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_5},
  doi          = {10.1007/978-3-540-73538-0\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BattistaP07,
  author       = {Giuseppe Di Battista and
                  Bernardo Palazzi},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Authenticated Relational Tables and Authenticated Skip Lists},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_3},
  doi          = {10.1007/978-3-540-73538-0\_3},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BattistaP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BertolissiFB07,
  author       = {Clara Bertolissi and
                  Maribel Fern{\'{a}}ndez and
                  Steve Barker},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Dynamic Event-Based Access Control as Term Rewriting},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_15},
  doi          = {10.1007/978-3-540-73538-0\_15},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BertolissiFB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BiskupW07,
  author       = {Joachim Biskup and
                  Torben Weibert},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Confidentiality Policies for Controlled Query Evaluation},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_1},
  doi          = {10.1007/978-3-540-73538-0\_1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BiskupW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CanimK07,
  author       = {Mustafa Canim and
                  Murat Kantarcioglu},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Design and Analysis of Querying Encrypted Data in Relational Databases},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {177--194},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_14},
  doi          = {10.1007/978-3-540-73538-0\_14},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/CanimK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChakrabortyPR07,
  author       = {Sudip Chakraborty and
                  Nayot Poolsappasit and
                  Indrajit Ray},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Reliable Delivery of Event Data from Sensors to Actuators in Pervasive
                  Computing Environments},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {77--92},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_6},
  doi          = {10.1007/978-3-540-73538-0\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChakrabortyPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CruzTY07,
  author       = {Isabel F. Cruz and
                  Roberto Tamassia and
                  Danfeng Yao},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Privacy-Preserving Schema Matching Using Mutual Information},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {93--94},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_7},
  doi          = {10.1007/978-3-540-73538-0\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CruzTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DhankharKW07,
  author       = {Vijayant Dhankhar and
                  Saket Kaushik and
                  Duminda Wijesekera},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {{XACML} Policies for Exclusive Resource Usage},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {275--290},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_20},
  doi          = {10.1007/978-3-540-73538-0\_20},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/DhankharKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FernandezBDL07,
  author       = {Eduardo B. Fern{\'{a}}ndez and
                  Jose Ballesteros and
                  Ana C. Desouza{-}Doucet and
                  Maria M. Larrondo{-}Petrie},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Security Patterns for Physical Access Control Systems},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {259--274},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_19},
  doi          = {10.1007/978-3-540-73538-0\_19},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/FernandezBDL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JammalamadakaGMSV07,
  author       = {Ravi Chandra Jammalamadaka and
                  Roberto Gamboni and
                  Sharad Mehrotra and
                  Kent E. Seamons and
                  Nalini Venkatasubramanian},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {gVault: {A} Gmail Based Cryptographic Network File System},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_13},
  doi          = {10.1007/978-3-540-73538-0\_13},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/JammalamadakaGMSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KolterSP07,
  author       = {Jan Paul Kolter and
                  Rolf Schillinger and
                  G{\"{u}}nther Pernul},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {A Privacy-Enhanced Attribute-Based Access Control System},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {129--143},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_11},
  doi          = {10.1007/978-3-540-73538-0\_11},
  timestamp    = {Sun, 05 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/KolterSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LayfieldKT07,
  author       = {Ryan Layfield and
                  Murat Kantarcioglu and
                  Bhavani Thuraisingham},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Enforcing Honesty in Assured Information Sharing Within a Distributed
                  System},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {113--128},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_10},
  doi          = {10.1007/978-3-540-73538-0\_10},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LayfieldKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayT07,
  author       = {Indrakshi Ray and
                  Manachai Toahchoodee},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {A Spatio-temporal Role-Based Access Control Model},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {211--226},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_16},
  doi          = {10.1007/978-3-540-73538-0\_16},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangSJ07,
  author       = {Lingyu Wang and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Measuring the Overall Security of Network Configurations Using Attack
                  Graphs},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_9},
  doi          = {10.1007/978-3-540-73538-0\_9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/XuS07,
  author       = {Shouhuai Xu and
                  Ravi S. Sandhu},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {A Scalable and Secure Cryptographic Service},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {144--160},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_12},
  doi          = {10.1007/978-3-540-73538-0\_12},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/XuS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/YangLD07,
  author       = {Yanjiang Yang and
                  Yingjiu Li and
                  Robert H. Deng},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {New Paradigm of Inference Control with Trusted Computing},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_18},
  doi          = {10.1007/978-3-540-73538-0\_18},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/YangLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhaoSZQ07,
  author       = {Baoxian Zhao and
                  Ravi S. Sandhu and
                  Xinwen Zhang and
                  Xiaolin Qin},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Towards a Times-Based Usage Control Model},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {227--242},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_17},
  doi          = {10.1007/978-3-540-73538-0\_17},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhaoSZQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZychPJ07,
  author       = {Anna Zych and
                  Milan Petkovic and
                  Willem Jonker},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {The Interval Revocation Scheme for Broadcasting Messages to Stateless
                  Receivers},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {95--97},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_8},
  doi          = {10.1007/978-3-540-73538-0\_8},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZychPJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2007,
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0},
  doi          = {10.1007/978-3-540-73538-0},
  isbn         = {978-3-540-73533-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics