


default search action
26. DBSec 2012: Paris, France
- Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro

:
Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings. Lecture Notes in Computer Science 7371, Springer 2012, ISBN 978-3-642-31539-8
Invited Paper
- Leendert W. N. van der Torre

:
Logics for Security and Privacy. 1-7
Access Control
- Yuan Cheng

, Jaehong Park, Ravi S. Sandhu:
A User-to-User Relationship-Based Access Control Model for Online Social Networks. 8-24 - Alessandro Armando

, Silvio Ranise
:
Automated and Efficient Analysis of Role-Based Access Control with Attributes. 25-40 - Xin Jin, Ram Krishnan

, Ravi S. Sandhu:
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. 41-55
Confidentiality and Privacy
- Joachim Biskup, Sven Hartmann, Sebastian Link

, Jan-Hendrik Lochner, Torsten Schlotmann:
Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies. 56-73 - Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini:

Privacy Consensus in Anonymization Systems via Game Theory. 74-89 - Gianluca Dini

, Pericle Perazzo
:
Uniform Obfuscation for Location Privacy. 90-105
Smart Cards Security (Short Papers)
- Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi:

Security Vulnerabilities of User Authentication Scheme Using Smart Card. 106-113 - Ding Wang

, Chunguang Ma, Peng Wu:
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. 114-121 - Tiana Razafindralambo, Guillaume Bouffard

, Jean-Louis Lanet:
A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard. 122-128
Privacy-Preserving Technologies
- Robert Nix, Murat Kantarcioglu, Keesook J. Han:

Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data. 129-144 - Jonathan L. Dautrich Jr., Chinya V. Ravishankar

:
Security Limitations of Using Secret Sharing for Data Outsourcing. 145-160 - Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong

, Nabil R. Adam, Vijayalakshmi Atluri
:
Privacy-Preserving Subgraph Discovery. 161-176
Data Management
- Simon N. Foley

, William M. Fitzgerald:
Decentralized Semantic Threat Graphs. 177-192 - Rami Sharon, Ehud Gudes:

Code Type Revealing Using Experiments Framework. 193-206 - Nikolay Yakovets

, Jarek Gryz, Stephanie Hazlewood, Paul van Run:
From MDM to DB2: A Case Study of Security Enforcement Migration. 207-222
Intrusion and Malware
- Smitha Sundareswaran, Anna Cinzia Squicciarini

:
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks. 223-238 - Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham:

Randomizing Smartphone Malware Profiles against Statistical Mining Techniques. 239-254
Probabilistic Attacks and Protection (Short Papers)
- Hamed Saljooghinejad, Wilson Naik Bhukya:

Layered Security Architecture for Masquerade Attack Detection. 255-262 - Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili:

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing. 263-273 - Sébastien Gambs, Ahmed Gmati, Michel Hurfin:

Reconstruction Attack through Classifier Analysis. 274-281
Cloud Computing
- Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga:

Distributed Data Federation without Disclosure of User Existence. 282-297 - Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing:

Improving Virtualization Security by Splitting Hypervisor into Smaller Components. 298-313 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
:
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios. 314-329

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














