


default search action
24. DBSec 2010: Rome, Italy
- Sara Foresti, Sushil Jajodia:

Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6166, Springer 2010, ISBN 978-3-642-13738-9
Query and Data Privacy
- Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi:

Generalizing PIR for Practical Private Retrieval of Public Data. 1-16 - Steve Barker, Valerio Genovese:

A Logic of Privacy. 17-32 - Zutao Zhu, Wenliang Du:

Understanding Privacy Risk of Publishing Decision Trees. 33-48
Data Protection
- Marina Blanton

, Mehrdad Aliasgari:
Secure Outsourcing of DNA Searching via Finite Automata. 49-64 - Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu

:
A Labelling System for Derived Data Control. 65-80 - Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:

On the Identification of Property Based Generalizations in Microdata Anonymization. 81-96
Access Control
- Jaideep Vaidya, Vijayalakshmi Atluri

, Qi Guo, Haibing Lu:
Role Mining in the Presence of Noise. 97-112 - Angela Bonifati

, Ruilin Liu, Wendy Hui Wang:
Distributed and Secure Access Control in P2P Databases. 113-129 - Jason Crampton, Rosli Daud, Keith M. Martin:

Constructing Key Assignment Schemes from Chain Partitions. 130-145
Data Confidentiality and Query Veri?cation
- Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:

fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality. 146-161 - Joachim Biskup, Sven Hartmann, Sebastian Link

, Jan-Hendrik Lochner:
Efficient Inference Control for Open Relational Queries. 162-176 - Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco:

Query Racing: Fast Completeness Certification of Query Results. 177-192
Policy Definition and Enforcement
- JeeHyun Hwang, Tao Xie, Vincent C. Hu

, Mine Altunay:
Mining Likely Properties of Access Control Policies via Association Rule Mining. 193-208 - Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham:

Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. 209-224 - Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga

, Steve J. Chapin:
Enforcing Request Integrity in Web Applications. 225-240
Trust and Identity Management
- Siv Hilde Houmb, Sudip Chakraborty

, Indrakshi Ray, Indrajit Ray:
Using Trust-Based Information Aggregation for Predicting Security Level of Systems. 241-256 - Aarthi Nagarajan, Vijay Varadharajan

:
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. 257-272 - Jan Zibuschka, Matthias Herbert, Heiko Rossnagel

:
Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms. 273-286
Short Papers
- Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula

, Faten Labbene Ayachi:
An Access Control Model for Web Databases. 287-294 - Hasan Qunoo, Mark Ryan

:
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems. 295-302 - Alessandro Colantonio, Roberto Di Pietro

, Alberto Ocello, Nino Vincenzo Verde:
Evaluating the Risk of Adopting RBAC Roles. 303-310 - Amril Syalim, Takashi Nishide, Kouichi Sakurai:

Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. 311-318 - Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen:

When ABE Meets RSS. 319-326 - Kristof Verslype, Pieter Verhaeghe, Jorn Lapon

, Vincent Naessens, Bart De Decker:
PriMan : A Privacy-Preserving Identity Framework. 327-334 - Alex Hai Wang:

Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. 335-342 - Ramaswamy Chandramouli:

Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach. 343-349 - Kun Peng, Feng Bao:

A Secure RFID Ticket System for Public Transport. 350-357 - Suratose Tritilanunt:

Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols. 358-365 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar:

Secure Location Verification - A Security Analysis of GPS Signal Authentication. 366-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














