Table of Contents
|
Data and Applications Security and Privacy XXV Yingjiu Li (Ed.)
|
Front Matter |
Invited Papers
|
Information Flow Containment: A Practical Basis for Malware Defense R. Sekar |
1-3 |
Re-designing the Web’s Access Control System Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu |
4-11 |
Integrated Management of Security Policies Stefano Paraboschi |
12-13 |
Access Control I
|
Cooperative Data Access in Multi-cloud Environments Meixing Le, Krishna Kant, Sushil Jajodia |
14-28 |
Multiparty Authorization Framework for Data Sharing in Online Social Networks Hongxin Hu, Gail-Joon Ahn |
29-43 |
Privacy-Preserving Data Applications I
|
Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach Valentina Ciriani, Sabrina Capitani Di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati |
44-59 |
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity Florian Kerschbaum |
60-75 |
Access Control II
|
An Optimization Model for the Extended Role Mining Problem Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya |
76-89 |
Dynamics in Delegation and Revocation Schemes: A Logical Approach Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert Van Der Torre |
90-105 |
Data Confidentiality and Query Verification
|
History-Dependent Inference Control of Queries by Dynamic Policy Adaption Joachim Biskup |
106-121 |
Multilevel Secure Data Stream Processing Raman Adaikkalavan, Indrakshi Ray, Xing Xie |
122-137 |
Query and Data Privacy
|
Query Processing in Private Data Outsourcing Using Anonymization Ahmet Nergiz, Chris Clifton |
138-153 |
Private Database Search with Sublinear Query Time Keith Frikken, Boyang Li |
154-169 |
Privacy-Preserving Data Applications II
|
Efficient Distributed Linear Programming with Limited Disclosure Yuan Hong, Jaideep Vaidya, Haibing Lu |
170-185 |
Privacy-Preserving Data Mining: A Game-Theoretic Approach Atsuko Miyaji, Mohammad Rahman |
186-200 |
Authentication and Secret Sharing
|
Enhancing CardSpace Authentication Using a Mobile Device Haitham Al-Sinani, Chris Mitchell |
201-216 |
Verifiable Secret Sharing with Comprehensive and Efficient Public Verification Kun Peng |
217-230 |
Short Papers
|
A Robust Remote User Authentication Scheme against Smart Card Security Breach Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee |
231-238 |
N-Gram Based Secure Similar Document Detection Wei Jiang, Bharath Samanthula |
239-246 |
An Index Structure for Private Data Outsourcing Aaron Steele, Keith Frikken |
247-254 |
Selective Disclosure on Encrypted Documents Hao Lei, Dengguo Feng |
255-262 |
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model Yu Chen, Song Luo, Zhong Chen |
263-270 |
Accurate Accident Reconstruction in VANET Yuliya Kopylova, Csilla Farkas, Wenyuan Xu |
271-279 |
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez |
280-292 |
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC Solomon Berhe, Steven Demurjian, Swapna Gokhale, Jaime Pavlich-Mariscal, Rishi Saripalle |
293-300 |
Preserving Privacy in Structural Neuroimages Nakeisha Schimke, Mary Kuehler, John Hale |
301-308 |