IFIP TC6 Open Digital Library

25. DBSec 2011: Richmond, VA, USA

Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings

Yingjiu Li

Springer, Lecture Notes in Computer Science 6818, ISBN: 978-3-642-22347-1



Contents

Invited Papers

Information Flow Containment: A Practical Basis for Malware Defense.

R. Sekar

 1-3

Re-designing the Web's Access Control System - (Extended Abstract).

Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu

 4-11

Integrated Management of Security Policies.

Stefano Paraboschi

 12-13

Access Control I

Cooperative Data Access in Multi-cloud Environments.

Meixing Le, Krishna Kant, Sushil Jajodia

 14-28

Multiparty Authorization Framework for Data Sharing in Online Social Networks.

Hongxin Hu, Gail-Joon Ahn

 29-43

Privacy-Preserving Data Applications I

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach.

Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati

 44-59

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity.

Florian Kerschbaum

 60-75

Access Control II

An Optimization Model for the Extended Role Mining Problem.

Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya

 76-89

Dynamics in Delegation and Revocation Schemes: A Logical Approach.

Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert van der Torre

 90-105

Data Confidentiality and Query Verification

History-Dependent Inference Control of Queries by Dynamic Policy Adaption.

Joachim Biskup

 106-121

Multilevel Secure Data Stream Processing.

Raman Adaikkalavan, Indrakshi Ray, Xing Xie

 122-137

Query and Data Privacy

Query Processing in Private Data Outsourcing Using Anonymization.

Ahmet Erhan Nergiz, Chris Clifton

 138-153

Private Database Search with Sublinear Query Time.

Keith B. Frikken, Boyang Li

 154-169

Privacy-Preserving Data Applications II

Efficient Distributed Linear Programming with Limited Disclosure.

Yuan Hong, Jaideep Vaidya, Haibing Lu

 170-185

Privacy-Preserving Data Mining: A Game-Theoretic Approach.

Atsuko Miyaji, Mohammad Shahriar Rahman

 186-200

Authentication and Secret Sharing

Enhancing CardSpace Authentication Using a Mobile Device.

Haitham S. Al-Sinani, Chris J. Mitchell

 201-216

Verifiable Secret Sharing with Comprehensive and Efficient Public Verification.

Kun Peng

 217-230

Short Papers

A Robust Remote User Authentication Scheme against Smart Card Security Breach.

Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee

 231-238

N-Gram Based Secure Similar Document Detection.

Wei Jiang, Bharath K. Samanthula

 239-246

An Index Structure for Private Data Outsourcing.

Aaron Steele, Keith B. Frikken

 247-254

Selective Disclosure on Encrypted Documents.

Hao Lei, Dengguo Feng

 255-262

A New Leakage-Resilient IBE Scheme in the Relative Leakage Model.

Yu Chen, Song Luo, Zhong Chen

 263-270

Accurate Accident Reconstruction in VANET.

Yuliya Kopylova, Csilla Farkas, Wenyuan Xu

 271-279

Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning.

Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez

 280-292

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC.

Solomon Berhe, Steven A. Demurjian, Swapna S. Gokhale, Jaime A. Pavlich-Mariscal, Rishi Saripalle

 293-300

Preserving Privacy in Structural Neuroimages.

Nakeisha Schimke, Mary Kuehler, John Hale

 301-308