


default search action
Search dblp for Publications
export results for "toc:db/conf/codaspy/codaspy2011.bht:"
@inproceedings{DBLP:conf/codaspy/BilogrevicJHAN11, author = {Igor Bilogrevic and Murtuza Jadliwala and Jean{-}Pierre Hubaux and Imad Aad and Valtteri Niemi}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Privacy-preserving activity scheduling on mobile devices}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {261--272}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943549}, doi = {10.1145/1943513.1943549}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/BilogrevicJHAN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BrancikG11, author = {Kenneth Brancik and Gabriel Ghinita}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {The optimization of situational awareness for insider threat detection}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {231--236}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943544}, doi = {10.1145/1943513.1943544}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/BrancikG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/CadenheadKKT11, author = {Tyrone Cadenhead and Vaibhav Khadilkar and Murat Kantarcioglu and Bhavani Thuraisingham}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {A language for provenance access control}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {133--144}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943532}, doi = {10.1145/1943513.1943532}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/CadenheadKKT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/CarminatiFMT11, author = {Barbara Carminati and Elena Ferrari and Sandro Morasca and Davide Taibi}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {51--62}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943522}, doi = {10.1145/1943513.1943522}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/CarminatiFMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChenKG11, author = {Keke Chen and Ramakanth Kavuluru and Shumin Guo}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {{RASP:} efficient multidimensional range query on attack-resilient encrypted databases}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {249--260}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943547}, doi = {10.1145/1943513.1943547}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ChenKG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChenM11, author = {You Chen and Bradley A. Malin}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Detection of anomalous insiders in collaborative environments via relational analysis of access logs}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {63--74}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943524}, doi = {10.1145/1943513.1943524}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ChenM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ContiHC11, author = {Mauro Conti and Arbnor Hasani and Bruno Crispo}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Virtual private social networks}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {39--50}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943521}, doi = {10.1145/1943513.1943521}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ContiHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Dickson11, author = {John B. Dickson}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Software security: is ok good enough?}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {25--26}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943518}, doi = {10.1145/1943513.1943518}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/Dickson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Fong11, author = {Philip W. L. Fong}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Relationship-based access control: protection model and policy language}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {191--202}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943539}, doi = {10.1145/1943513.1943539}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/Fong11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GoodrichK11, author = {Michael T. Goodrich and Florian Kerschbaum}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {273--282}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943550}, doi = {10.1145/1943513.1943550}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/GoodrichK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JafariFSBS11, author = {Mohammad Jafari and Philip W. L. Fong and Reihaneh Safavi{-}Naini and Ken Barker and Nicholas Paul Sheppard}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Towards defining semantic foundations for purpose-based privacy policies}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {213--224}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943541}, doi = {10.1145/1943513.1943541}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/JafariFSBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JahidGHO11, author = {Sonia Jahid and Carl A. Gunter and Imranul Hoque and Hamed Okhravi}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {MyABDAC: compiling {XACML} policies for attribute-based database access control}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {97--108}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943528}, doi = {10.1145/1943513.1943528}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/JahidGHO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JinTJ11, author = {Lei Jin and Hassan Takabi and James B. D. Joshi}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Towards active detection of identity clone attacks on online social networks}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {27--38}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943520}, doi = {10.1145/1943513.1943520}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/JinTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KirkpatrickK11, author = {Michael S. Kirkpatrick and Sam Kerr}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Enforcing physically restricted access control for remote data}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {203--212}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943540}, doi = {10.1145/1943513.1943540}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/KirkpatrickK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KomlenovicTZ11, author = {Marko Komlenovic and Mahesh V. Tripunitara and Toufik Zitouni}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {An empirical assessment of approaches to distributed enforcement in role-based access control {(RBAC)}}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {121--132}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943530}, doi = {10.1145/1943513.1943530}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/KomlenovicTZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KostiainenREA11, author = {Kari Kostiainen and Elena Reshetova and Jan{-}Erik Ekberg and N. Asokan}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {13--24}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943517}, doi = {10.1145/1943513.1943517}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/KostiainenREA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KumariPPK11, author = {Prachi Kumari and Alexander Pretschner and Jonas Peschla and Jens{-}Michael Kuhn}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Distributed data usage control for web applications: a social network implementation}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {85--96}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943526}, doi = {10.1145/1943513.1943526}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/KumariPPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LorenziV11, author = {David Lorenzi and Jaideep Vaidya}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Identifying a critical threat to privacy through automatic image classification}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {157--168}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943535}, doi = {10.1145/1943513.1943535}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LorenziV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MalkinTY11, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Key dependent message security: recent results and applications}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {3--12}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943516}, doi = {10.1145/1943513.1943516}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MalkinTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MayerTWM11, author = {Daniel A. Mayer and Dominik Teubert and Susanne Wetzel and Ulrike Meyer}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {109--120}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943529}, doi = {10.1145/1943513.1943529}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MayerTWM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MurugesanJNU11, author = {Mummoorthy Murugesan and Wei Jiang and Ahmet Erhan Nergiz and Serkan Uzunbaz}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {169--178}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943536}, doi = {10.1145/1943513.1943536}, timestamp = {Tue, 29 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/MurugesanJNU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/QianX11, author = {Haifeng Qian and Shouhuai Xu}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Non-interactive editable signatures for assured data provenance}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {145--156}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943533}, doi = {10.1145/1943513.1943533}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/QianX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Sandhu11, author = {Ravi S. Sandhu}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {The challenge of data and application security and privacy {(DASPY):} are we up to it}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {1--2}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943515}, doi = {10.1145/1943513.1943515}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/Sandhu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Thomsen11, author = {Dan Thomsen}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Practical policy patterns}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {225--230}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943543}, doi = {10.1145/1943513.1943543}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/Thomsen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Wang11, author = {Xiaoyang Sean Wang}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Panel: research agenda for data and application security}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {283--284}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943551}, doi = {10.1145/1943513.1943551}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/Wang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/XiKI11, author = {Bowei Xi and Murat Kantarcioglu and Ali Inan}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Mixture of gaussian models and bayes error under differential privacy}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {179--190}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943537}, doi = {10.1145/1943513.1943537}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/XiKI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/YuZLL11, author = {Junfeng Yu and Shengzhi Zhang and Peng Liu and Zhitang Li}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {LeakProber: a framework for profiling sensitive data leakage paths}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {75--84}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943525}, doi = {10.1145/1943513.1943525}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/YuZLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhengX11, author = {Qingji Zheng and Shouhuai Xu}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Fair and dynamic proofs of retrievability}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {237--248}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943546}, doi = {10.1145/1943513.1943546}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhengX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2011, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, publisher = {{ACM}}, year = {2011}, isbn = {978-1-4503-0466-5}, timestamp = {Tue, 07 Jun 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
