24. DBSec 2010: Rome, Italy
Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
Sara Foresti, Sushil Jajodia
Springer, Lecture Notes in Computer Science 6166, ISBN: 978-3-642-13738-9
Contents
Query and Data Privacy
Generalizing PIR for Practical Private Retrieval of Public Data.
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
1-16
Data Protection
On the Identification of Property Based Generalizations in Microdata Anonymization.
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley
81-96
Access Control
Role Mining in the Presence of Noise.
Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu
97-112
Distributed and Secure Access Control in P2P Databases.
Angela Bonifati, Ruilin Liu, Wendy Hui Wang
113-129
Constructing Key Assignment Schemes from Chain Partitions.
Jason Crampton, Rosli Daud, Keith M. Martin
130-145
Data Confidentiality and Query Veri?cation
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality.
Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci
146-161
Efficient Inference Control for Open Relational Queries.
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner
162-176
Query Racing: Fast Completeness Certification of Query Results.
Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco
177-192
Policy Definition and Enforcement
Mining Likely Properties of Access Control Policies via Association Rule Mining.
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay
193-208
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control.
Tyrone Cadenhead, Murat Kantarcioglu, Bhavani M. Thuraisingham
209-224
Enforcing Request Integrity in Web Applications.
Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin
225-240
Trust and Identity Management
Using Trust-Based Information Aggregation for Predicting Security Level of Systems.
Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray
241-256
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms.
Aarthi Nagarajan, Vijay Varadharajan
257-272
Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms.
Jan Zibuschka, Matthias Herbert, Heiko Rossnagel
273-286
Short Papers
An Access Control Model for Web Databases.
Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene-Ayachi
287-294
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems.
Hasan Qunoo, Mark Ryan
295-302
Evaluating the Risk of Adopting RBAC Roles.
Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde
303-310
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance.
Amril Syalim, Takashi Nishide, Kouichi Sakurai
311-318
PriMan : A Privacy-Preserving Identity Framework.
Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker
327-334
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach.
Alex Hai Wang
335-342
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach.
Ramaswamy Chandramouli
343-349
Suratose Tritilanunt
358-365
Secure Location Verification - A Security Analysis of GPS Signal Authentication.
Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar
366-373