Search - Data and Applications Security and Privacy XXIV Access content directly

Filter your results

30 results
Contributor/author Internal identifier : 200187
Image document

On the Identification of Property Based Generalizations in Microdata Anonymization

Rinku Dewri , Indrajit Ray , Indrakshi Ray , Darrell Whitley
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.81-96, ⟨10.1007/978-3-642-13739-6_6⟩
Conference papers hal-01056667v1
Image document

A Labelling System for Derived Data Control

Enrico Scalavino , Vaibhav Gowadia , Emil C. Lupu
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.65-80, ⟨10.1007/978-3-642-13739-6_5⟩
Conference papers hal-01056668v1
Image document

Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems

Hasan Qunoo , Mark Ryan
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.295-302, ⟨10.1007/978-3-642-13739-6_20⟩
Conference papers hal-01056680v1
Image document

Generalizing PIR for Practical Private Retrieval of Public Data

Shiyuan Wang , Divyakant Agrawal , Amr Abbadi
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.1-16, ⟨10.1007/978-3-642-13739-6_1⟩
Conference papers hal-01056681v1
Image document

An Access Control Model for Web Databases

Ahlem Bouchahda-Ben Tekaya , Nhan Thanh , Adel Bouhoula , Faten Labbene-Ayachi
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.287-294, ⟨10.1007/978-3-642-13739-6_19⟩
Conference papers hal-01056682v1
Image document

Mining Likely Properties of Access Control Policies via Association Rule Mining

Jeehyun Hwang , Tao Xie , Vincent Hu , Mine Altunay
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.193-208, ⟨10.1007/978-3-642-13739-6_13⟩
Conference papers hal-01056688v1
Image document

Secure Outsourcing of DNA Searching via Finite Automata

Marina Blanton , Mehrdad Aliasgari
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.49-64, ⟨10.1007/978-3-642-13739-6_4⟩
Conference papers hal-01056669v1
Image document

Evaluating the Risk of Adopting RBAC Roles

Alessandro Colantonio , Roberto Pietro , Alberto Ocello , Nino Vincenzo Verde
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.303-310, ⟨10.1007/978-3-642-13739-6_21⟩
Conference papers hal-01056679v1
Image document

Constructing Key Assignment Schemes from Chain Partitions

Jason Crampton , Rosli Daud , Keith M. Martin
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.130-145, ⟨10.1007/978-3-642-13739-6_9⟩
Conference papers hal-01056664v1

Data and Applications Security and Privacy XXIV

Sara Foresti , Sushil Jajodia
Springer, LNCS-6166, 2010, Lecture Notes in Computer Science, 978-3-642-13738-9. ⟨10.1007/978-3-642-13739-6⟩
Books hal-01555409v1
Image document

A Secure RFID Ticket System for Public Transport

Kun Peng , Feng Bao
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.350-357, ⟨10.1007/978-3-642-13739-6_27⟩
Conference papers hal-01056673v1
Image document

Query Racing: Fast Completeness Certification of Query Results

Bernardo Palazzi , Maurizio Pizzonia , Stefano Pucacco
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.177-192, ⟨10.1007/978-3-642-13739-6_12⟩
Conference papers hal-01056689v1
Image document

Enforcing Request Integrity in Web Applications

Karthick Jayaraman , Grzegorz Lewandowski , Paul G. Talaga , Steve J. Chapin
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.225-240, ⟨10.1007/978-3-642-13739-6_15⟩
Conference papers hal-01056686v1
Image document

Understanding Privacy Risk of Publishing Decision Trees

Zutao Zhu , Wenliang Du
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.33-48, ⟨10.1007/978-3-642-13739-6_3⟩
Conference papers hal-01056670v1
Image document

A Logic of Privacy

Steve Barker , Valerio Genovese
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.17-32, ⟨10.1007/978-3-642-13739-6_2⟩
Conference papers hal-01056671v1
Image document

Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach

Alex Hai Wang
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.335-342, ⟨10.1007/978-3-642-13739-6_25⟩
Conference papers hal-01056675v1
Image document

Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms

Aarthi Nagarajan , Vijay Varadharajan
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.257-272, ⟨10.1007/978-3-642-13739-6_17⟩
Conference papers hal-01056684v1
Image document

Role Mining in the Presence of Noise

Jaideep Vaidya , Vijayalakshmi Atluri , Qi Guo , Haibing Lu
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.97-112, ⟨10.1007/978-3-642-13739-6_7⟩
Conference papers hal-01056666v1
Image document

Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols

Suratose Tritilanunt
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.358-365, ⟨10.1007/978-3-642-13739-6_28⟩
Conference papers hal-01056672v1
Image document

Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms

Jan Zibuschka , Matthias Herbert , Heiko Rossnagel
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.273-286, ⟨10.1007/978-3-642-13739-6_18⟩
Conference papers hal-01056683v1
Image document

When ABE Meets RSS

Yu Chen , Hyun Sung Kim , Jianbin Hu , Zhong Chen
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.319-326, ⟨10.1007/978-3-642-13739-6_23⟩
Conference papers hal-01056677v1
Image document

Distributed and Secure Access Control in P2P Databases

Angela Bonifati , Ruilin Liu , Hui (wendy) Wang
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.113-129, ⟨10.1007/978-3-642-13739-6_8⟩
Conference papers hal-01056665v1
Image document

Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance

Amril Syalim , Takashi Nishide , Kouichi Sakurai
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.311-318, ⟨10.1007/978-3-642-13739-6_22⟩
Conference papers hal-01056678v1
Image document

Scalable and Efficient Reasoning for Enforcing Role-Based Access Control

Tyrone Cadenhead , Murat Kantarcioglu , Bhavani Thuraisingham
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.209-224, ⟨10.1007/978-3-642-13739-6_14⟩
Conference papers hal-01056687v1
Image document

Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach

Ramaswamy Chandramouli
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.343-349, ⟨10.1007/978-3-642-13739-6_26⟩
Conference papers hal-01056674v1
Image document

fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality

Said Oulmakhzoune , Nora Cuppens-Bouhlahia , Frédéric Cuppens , Stephane Morucci
DBSEC 2010 : 24th annual IFIP WG 11.3 working conference on data and applications security and privacy XXIV, Jun 2010, Roma, Italy. pp.146-161, ⟨10.1007/978-3-642-13739-6_10⟩
Conference papers hal-01056741v1
Image document

Using Trust-Based Information Aggregation for Predicting Security Level of Systems

Siv Hilde Houmb , Sudip Chakraborty , Indrakshi Ray , Indrajit Ray
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.241-256, ⟨10.1007/978-3-642-13739-6_16⟩
Conference papers hal-01056685v1
Image document

Efficient Inference Control for Open Relational Queries

Joachim Biskup , Sven Hartmann , Sebastian Link , Jan-Hendrik Lochner
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.162-176, ⟨10.1007/978-3-642-13739-6_11⟩
Conference papers hal-01056690v1
Image document

PriMan : A Privacy-Preserving Identity Framework

Kristof Verslype , Pieter Verhaeghe , Jorn Lapon , Vincent Naessens , Bart Decker
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.327-334, ⟨10.1007/978-3-642-13739-6_24⟩
Conference papers hal-01056676v1
Image document

Secure Location Verification

Georg T. Becker , Sherman C. Lo , David S. Lorenzo , Per K. Enge , Christof Paar
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.366-373, ⟨10.1007/978-3-642-13739-6_29⟩
Conference papers hal-01056742v1