21. DBSec 2007: Redondo Beach, CA, USA
Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings
Steve Barker, Gail-Joon Ahn
Springer, Lecture Notes in Computer Science 4602, ISBN: 978-3-540-73533-5
Contents
Secure Query Evaluation
Provably-Secure Schemes for Basic Query Support in Outsourced Databases.
Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill
14-30
Authenticated Relational Tables and Authenticated Skip Lists.
Giuseppe Di Battista, Bernardo Palazzi
31-46
Location-Based Security/Mobile Security
Location Privacy Protection Through Obfuscation-Based Techniques.
Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
47-60
Efficient Security Policy Enforcement in a Location Based Service Environment.
Vijayalakshmi Atluri, Heechang Shin
61-76
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray
77-92
Short Papers
Privacy-Preserving Schema Matching Using Mutual Information.
Isabel F. Cruz, Roberto Tamassia, Danfeng Yao
93-94
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.
Anna Zych, Milan Petkovic, Willem Jonker
95-97
Distributed Security Issues
Measuring the Overall Security of Network Configurations Using Attack Graphs.
Lingyu Wang, Anoop Singhal, Sushil Jajodia
98-112
Enforcing Honesty in Assured Information Sharing Within a Distributed System.
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham
113-128
A Privacy-Enhanced Attribute-Based Access Control System.
Jan Kolter, Rolf Schillinger, Günther Pernul
129-143
Cryptographic-Based Security
gVault: A Gmail Based Cryptographic Network File System.
Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian
161-176
Design and Analysis of Querying Encrypted Data in Relational Databases.
Mustafa Canim, Murat Kantarcioglu
177-194
Temporal Access Control and Usage Control
Dynamic Event-Based Access Control as Term Rewriting.
Clara Bertolissi, Maribel Fernández, Steve Barker
195-210
Towards a Times-Based Usage Control Model.
Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin
227-242
System Security Issues
New Paradigm of Inference Control with Trusted Computing.
Yanjiang Yang, Yingjiu Li, Robert H. Deng
243-258
Security Patterns for Physical Access Control Systems.
Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie
259-274
XACML Policies for Exclusive Resource Usage.
Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera
275-290