


default search action
25. DBSec 2011: Richmond, VA, USA
- Yingjiu Li:
Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings. Lecture Notes in Computer Science 6818, Springer 2011, ISBN 978-3-642-22347-1
Invited Papers
- R. Sekar:
Information Flow Containment: A Practical Basis for Malware Defense. 1-3 - Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu:
Re-designing the Web's Access Control System - (Extended Abstract). 4-11 - Stefano Paraboschi
:
Integrated Management of Security Policies. 12-13
Access Control I
- Meixing Le, Krishna Kant, Sushil Jajodia
:
Cooperative Data Access in Multi-cloud Environments. 14-28 - Hongxin Hu, Gail-Joon Ahn
:
Multiparty Authorization Framework for Data Sharing in Online Social Networks. 29-43
Privacy-Preserving Data Applications I
- Valentina Ciriani
, Sabrina De Capitani di Vimercati
, Sara Foresti
, Giovanni Livraga
, Pierangela Samarati
:
Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach. 44-59 - Florian Kerschbaum:
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity. 60-75
Access Control II
- Emre Uzun, Vijayalakshmi Atluri
, Haibing Lu, Jaideep Vaidya:
An Optimization Model for the Extended Role Mining Problem. 76-89 - Guillaume Aucher
, Steve Barker, Guido Boella, Valerio Genovese, Leendert W. N. van der Torre
:
Dynamics in Delegation and Revocation Schemes: A Logical Approach. 90-105
Data Confidentiality and Query Verification
- Joachim Biskup:
History-Dependent Inference Control of Queries by Dynamic Policy Adaption. 106-121 - Raman Adaikkalavan, Indrakshi Ray, Xing Xie:
Multilevel Secure Data Stream Processing. 122-137
Query and Data Privacy
- Ahmet Erhan Nergiz, Chris Clifton:
Query Processing in Private Data Outsourcing Using Anonymization. 138-153 - Keith B. Frikken, Boyang Li:
Private Database Search with Sublinear Query Time. 154-169
Privacy-Preserving Data Applications II
- Yuan Hong, Jaideep Vaidya, Haibing Lu:
Efficient Distributed Linear Programming with Limited Disclosure. 170-185 - Atsuko Miyaji
, Mohammad Shahriar Rahman
:
Privacy-Preserving Data Mining: A Game-Theoretic Approach. 186-200
Authentication and Secret Sharing
- Haitham S. Al-Sinani, Chris J. Mitchell
:
Enhancing CardSpace Authentication Using a Mobile Device. 201-216 - Kun Peng:
Verifiable Secret Sharing with Comprehensive and Efficient Public Verification. 217-230
Short Papers
- Chun-Ta Li
, Cheng-Chi Lee
, Chen-Ju Liu, Chin-Wen Lee:
A Robust Remote User Authentication Scheme against Smart Card Security Breach. 231-238 - Wei Jiang, Bharath K. Samanthula:
N-Gram Based Secure Similar Document Detection. 239-246 - Aaron Steele, Keith B. Frikken:
An Index Structure for Private Data Outsourcing. 247-254 - Hao Lei, Dengguo Feng:
Selective Disclosure on Encrypted Documents. 255-262 - Yu Chen, Song Luo, Zhong Chen:
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model. 263-270 - Yuliya Kopylova, Csilla Farkas, Wenyuan Xu:
Accurate Accident Reconstruction in VANET. 271-279 - Varun Dutt
, Young-Suk Ahn, Cleotilde Gonzalez:
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning. 280-292 - Solomon Berhe, Steven A. Demurjian, Swapna S. Gokhale, Jaime A. Pavlich-Mariscal
, Rishi Saripalle:
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC. 293-300 - Nakeisha Schimke, Mary Kuehler, John Hale
:
Preserving Privacy in Structural Neuroimages. 301-308

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.