


default search action
21. DBSec 2007: Redondo Beach, CA, USA
- Steve Barker, Gail-Joon Ahn:

Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings. Lecture Notes in Computer Science 4602, Springer 2007, ISBN 978-3-540-73533-5
Secure Query Evaluation
- Joachim Biskup, Torben Weibert:

Confidentiality Policies for Controlled Query Evaluation. 1-13 - Georgios Amanatidis

, Alexandra Boldyreva, Adam O'Neill:
Provably-Secure Schemes for Basic Query Support in Outsourced Databases. 14-30 - Giuseppe Di Battista, Bernardo Palazzi:

Authenticated Relational Tables and Authenticated Skip Lists. 31-46
Location-Based Security/Mobile Security
- Claudio A. Ardagna

, Marco Cremonini
, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Location Privacy Protection Through Obfuscation-Based Techniques. 47-60 - Vijayalakshmi Atluri

, Heechang Shin:
Efficient Security Policy Enforcement in a Location Based Service Environment. 61-76 - Sudip Chakraborty

, Nayot Poolsappasit, Indrajit Ray:
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. 77-92
Short Papers
- Isabel F. Cruz, Roberto Tamassia, Danfeng Yao

:
Privacy-Preserving Schema Matching Using Mutual Information. 93-94 - Anna Zych, Milan Petkovic, Willem Jonker:

The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. 95-97
Distributed Security Issues
- Lingyu Wang, Anoop Singhal, Sushil Jajodia:

Measuring the Overall Security of Network Configurations Using Attack Graphs. 98-112 - Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:

Enforcing Honesty in Assured Information Sharing Within a Distributed System. 113-128 - Jan Paul Kolter, Rolf Schillinger, Günther Pernul:

A Privacy-Enhanced Attribute-Based Access Control System. 129-143
Cryptographic-Based Security
- Shouhuai Xu, Ravi S. Sandhu:

A Scalable and Secure Cryptographic Service. 144-160 - Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:

gVault: A Gmail Based Cryptographic Network File System. 161-176 - Mustafa Canim, Murat Kantarcioglu:

Design and Analysis of Querying Encrypted Data in Relational Databases. 177-194
Temporal Access Control and Usage Control
- Clara Bertolissi, Maribel Fernández, Steve Barker:

Dynamic Event-Based Access Control as Term Rewriting. 195-210 - Indrakshi Ray, Manachai Toahchoodee:

A Spatio-temporal Role-Based Access Control Model. 211-226 - Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin:

Towards a Times-Based Usage Control Model. 227-242
System Security Issues
- Yanjiang Yang, Yingjiu Li, Robert H. Deng

:
New Paradigm of Inference Control with Trusted Computing. 243-258 - Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie

:
Security Patterns for Physical Access Control Systems. 259-274 - Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera:

XACML Policies for Exclusive Resource Usage. 275-290

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














