


default search action
27. DBSec 2013: Newark, NJ, USA
- Lingyu Wang, Basit Shafiq:

Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings. Lecture Notes in Computer Science 7964, Springer 2013, ISBN 978-3-642-39255-9
Privacy I
- Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Extending Loose Associations to Multiple Fragments. 1-16 - Joachim Biskup, Marcel Preuß:

Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret? 17-32 - Liyue Fan, Li Xiong

, Vaidy S. Sunderam:
Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring. 33-48
Access Control
- Ping Yang, Mikhail I. Gofman, Zijiang Yang:

Policy Analysis for Administrative Role Based Access Control without Separate Administration. 49-64 - Barsha Mitra, Shamik Sural

, Vijayalakshmi Atluri
, Jaideep Vaidya:
Toward Mining of Temporal Roles. 65-80 - Haibing Lu, Yuan Hong

, Yanjiang Yang, Lian Duan
, Nazia Badar:
Towards User-Oriented RBAC Model. 81-96
Cloud Computing
- Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison

, Abbie Barbir, Robert B. France:
Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations. 97-112 - Zhan Wang, Kun Sun, Sushil Jajodia

, Jiwu Jing:
TerraCheck: Verification of Dedicated Cloud Storage. 113-127
Privacy II
- Changyu Dong, Liqun Chen

, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. 128-144 - Hiroaki Kikuchi, Jun Sakuma:

Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection. 145-163 - Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:

Using Safety Constraint for Transactional Dataset Anonymization. 164-178
Data Outsourcing
- Attila Altay Yavuz

:
Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases. 179-194 - Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:

Optimal Re-encryption Strategy for Joins in Encrypted Databases. 195-210 - Rohit Jain, Sunil Prabhakar

:
Access Control and Query Verification for Untrusted Databases. 211-225
Mobile Computing
- Yang Wang, Jun Zheng

, Chen Sun, Srinivas Mukkamala:
Quantitative Security Risk Assessment of Android Permissions and Applications. 226-241 - Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han:

A Model for Trust-Based Access Control and Delegation in Mobile Clouds. 242-257
Short Papers
- Boxiang Dong

, Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Frequent Itemset Mining. 258-265 - Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen:

An Approach to Select Cost-Effective Risk Countermeasures. 266-273 - Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne

, Olivier Cipiere:
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase. 274-281 - Meixing Le, Krishna Kant, Sushil Jajodia

:
Rule Enforcement with Third Parties in Secure Cooperative Data Access. 282-288 - Ronald Petrlic, Stephan Sekula:

Unlinkable Content Playbacks in a Multiparty DRM System. 289-296 - Emre Uzun, Vijayalakshmi Atluri

, Jaideep Vaidya, Shamik Sural
:
Analysis of TRBAC with Dynamic Temporal Role Hierarchies. 297-304

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














