


default search action
CODASPY 2011: San Antonio, TX, USA
- Ravi S. Sandhu, Elisa Bertino:

First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0466-5
Keynote talks
- Ravi S. Sandhu:

The challenge of data and application security and privacy (DASPY): are we up to it. 1-2 - Tal Malkin, Isamu Teranishi, Moti Yung:

Key dependent message security: recent results and applications. 3-12 - Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg, N. Asokan

:
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures. 13-24 - John B. Dickson:

Software security: is ok good enough? 25-26
Security and privacy techniques for social networks
- Lei Jin, Hassan Takabi, James B. D. Joshi:

Towards active detection of identity clone attacks on online social networks. 27-38 - Mauro Conti

, Arbnor Hasani, Bruno Crispo:
Virtual private social networks. 39-50 - Barbara Carminati

, Elena Ferrari
, Sandro Morasca
, Davide Taibi
:
A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks. 51-62
Insider threats and data leakage
- You Chen, Bradley A. Malin

:
Detection of anomalous insiders in collaborative environments via relational analysis of access logs. 63-74 - Junfeng Yu, Shengzhi Zhang

, Peng Liu, Zhitang Li:
LeakProber: a framework for profiling sensitive data leakage paths. 75-84 - Prachi Kumari, Alexander Pretschner, Jonas Peschla, Jens-Michael Kuhn:

Distributed data usage control for web applications: a social network implementation. 85-96
Performance evaluation and enhancement
- Sonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi

:
MyABDAC: compiling XACML policies for attribute-based database access control. 97-108 - Daniel A. Mayer, Dominik Teubert, Susanne Wetzel, Ulrike Meyer:

Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets. 109-120 - Marko Komlenovic, Mahesh V. Tripunitara, Toufik Zitouni:

An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC). 121-132
Secure provenance
- Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:

A language for provenance access control. 133-144 - Haifeng Qian, Shouhuai Xu:

Non-interactive editable signatures for assured data provenance. 145-156
Privacy threats and protection techniques
- David Lorenzi, Jaideep Vaidya:

Identifying a critical threat to privacy through automatic image classification. 157-168 - Mummoorthy Murugesan, Wei Jiang, Ahmet Erhan Nergiz, Serkan Uzunbaz:

k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations. 169-178 - Bowei Xi, Murat Kantarcioglu, Ali Inan

:
Mixture of gaussian models and bayes error under differential privacy. 179-190
Novel models and systems for access control
- Philip W. L. Fong:

Relationship-based access control: protection model and policy language. 191-202 - Michael S. Kirkpatrick, Sam Kerr:

Enforcing physically restricted access control for remote data. 203-212 - Mohammad Jafari, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker, Nicholas Paul Sheppard

:
Towards defining semantic foundations for purpose-based privacy policies. 213-224
Invited industry and application papers
- Dan Thomsen:

Practical policy patterns. 225-230 - Kenneth Brancik, Gabriel Ghinita:

The optimization of situational awareness for insider threat detection. 231-236
Secure data outsourcing
- Qingji Zheng, Shouhuai Xu:

Fair and dynamic proofs of retrievability. 237-248 - Keke Chen, Ramakanth Kavuluru

, Shumin Guo:
RASP: efficient multidimensional range query on attack-resilient encrypted databases. 249-260
Novel applications of privacy techniques
- Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:

Privacy-preserving activity scheduling on mobile devices. 261-272 - Michael T. Goodrich

, Florian Kerschbaum:
Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions. 273-282 - Xiaoyang Sean Wang:

Panel: research agenda for data and application security. 283-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














