IFIP TC6 Open Digital Library

21. DBSec 2007: Redondo Beach, CA, USA

Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings

Steve Barker, Gail-Joon Ahn

Springer, Lecture Notes in Computer Science 4602, ISBN: 978-3-540-73533-5



Contents

Secure Query Evaluation

Confidentiality Policies for Controlled Query Evaluation.

Joachim Biskup, Torben Weibert

 1-13

Provably-Secure Schemes for Basic Query Support in Outsourced Databases.

Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill

 14-30

Authenticated Relational Tables and Authenticated Skip Lists.

Giuseppe Di Battista, Bernardo Palazzi

 31-46

Location-Based Security/Mobile Security

Location Privacy Protection Through Obfuscation-Based Techniques.

Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati

 47-60

Efficient Security Policy Enforcement in a Location Based Service Environment.

Vijayalakshmi Atluri, Heechang Shin

 61-76

Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.

Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray

 77-92

Short Papers

Privacy-Preserving Schema Matching Using Mutual Information.

Isabel F. Cruz, Roberto Tamassia, Danfeng Yao

 93-94

The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.

Anna Zych, Milan Petkovic, Willem Jonker

 95-97

Distributed Security Issues

Measuring the Overall Security of Network Configurations Using Attack Graphs.

Lingyu Wang, Anoop Singhal, Sushil Jajodia

 98-112

Enforcing Honesty in Assured Information Sharing Within a Distributed System.

Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham

 113-128

A Privacy-Enhanced Attribute-Based Access Control System.

Jan Kolter, Rolf Schillinger, Günther Pernul

 129-143

Cryptographic-Based Security

A Scalable and Secure Cryptographic Service.

Shouhuai Xu, Ravi S. Sandhu

 144-160

gVault: A Gmail Based Cryptographic Network File System.

Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian

 161-176

Design and Analysis of Querying Encrypted Data in Relational Databases.

Mustafa Canim, Murat Kantarcioglu

 177-194

Temporal Access Control and Usage Control

Dynamic Event-Based Access Control as Term Rewriting.

Clara Bertolissi, Maribel Fernández, Steve Barker

 195-210

A Spatio-temporal Role-Based Access Control Model.

Indrakshi Ray, Manachai Toahchoodee

 211-226

Towards a Times-Based Usage Control Model.

Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin

 227-242

System Security Issues

New Paradigm of Inference Control with Trusted Computing.

Yanjiang Yang, Yingjiu Li, Robert H. Deng

 243-258

Security Patterns for Physical Access Control Systems.

Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie

 259-274

XACML Policies for Exclusive Resource Usage.

Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera

 275-290