default search action
26. DBSec 2012: Paris, France
- Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings. Lecture Notes in Computer Science 7371, Springer 2012, ISBN 978-3-642-31539-8
Invited Paper
- Leendert W. N. van der Torre:
Logics for Security and Privacy. 1-7
Access Control
- Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
A User-to-User Relationship-Based Access Control Model for Online Social Networks. 8-24 - Alessandro Armando, Silvio Ranise:
Automated and Efficient Analysis of Role-Based Access Control with Attributes. 25-40 - Xin Jin, Ram Krishnan, Ravi S. Sandhu:
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. 41-55
Confidentiality and Privacy
- Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann:
Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies. 56-73 - Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini:
Privacy Consensus in Anonymization Systems via Game Theory. 74-89 - Gianluca Dini, Pericle Perazzo:
Uniform Obfuscation for Location Privacy. 90-105
Smart Cards Security (Short Papers)
- Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi:
Security Vulnerabilities of User Authentication Scheme Using Smart Card. 106-113 - Ding Wang, Chunguang Ma, Peng Wu:
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. 114-121 - Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet:
A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard. 122-128
Privacy-Preserving Technologies
- Robert Nix, Murat Kantarcioglu, Keesook J. Han:
Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data. 129-144 - Jonathan L. Dautrich Jr., Chinya V. Ravishankar:
Security Limitations of Using Secret Sharing for Data Outsourcing. 145-160 - Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri:
Privacy-Preserving Subgraph Discovery. 161-176
Data Management
- Simon N. Foley, William M. Fitzgerald:
Decentralized Semantic Threat Graphs. 177-192 - Rami Sharon, Ehud Gudes:
Code Type Revealing Using Experiments Framework. 193-206 - Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run:
From MDM to DB2: A Case Study of Security Enforcement Migration. 207-222
Intrusion and Malware
- Smitha Sundareswaran, Anna Cinzia Squicciarini:
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks. 223-238 - Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham:
Randomizing Smartphone Malware Profiles against Statistical Mining Techniques. 239-254
Probabilistic Attacks and Protection (Short Papers)
- Hamed Saljooghinejad, Wilson Naik Bhukya:
Layered Security Architecture for Masquerade Attack Detection. 255-262 - Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili:
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing. 263-273 - Sébastien Gambs, Ahmed Gmati, Michel Hurfin:
Reconstruction Attack through Classifier Analysis. 274-281
Cloud Computing
- Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga:
Distributed Data Federation without Disclosure of User Existence. 282-297 - Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing:
Improving Virtualization Security by Splitting Hypervisor into Smaller Components. 298-313 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga:
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios. 314-329
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.