Search - Data and Applications Security and Privacy XXV Access content directly

Filter your results

26 results
Contributor/author Internal identifier : 200187
Image document

Multiparty Authorization Framework for Data Sharing in Online Social Networks

Hongxin Hu , Gail-Joon Ahn
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.29-43, ⟨10.1007/978-3-642-22348-8_5⟩
Conference papers hal-01586571v1
Image document

Selective Disclosure on Encrypted Documents

Hao Lei , Dengguo Feng
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.255-262, ⟨10.1007/978-3-642-22348-8_21⟩
Conference papers hal-01586575v1
Image document

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity

Florian Kerschbaum
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩
Conference papers hal-01586579v1
Image document

An Index Structure for Private Data Outsourcing

Aaron Steele , Keith B. Frikken
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.247-254, ⟨10.1007/978-3-642-22348-8_20⟩
Conference papers hal-01586578v1
Image document

Privacy-Preserving Data Mining: A Game-Theoretic Approach

Atsuko Miyaji , Mohammad Shahriar Rahman
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.186-200, ⟨10.1007/978-3-642-22348-8_15⟩
Conference papers hal-01586580v1
Image document

A Robust Remote User Authentication Scheme against Smart Card Security Breach

Chun-Ta Li , Cheng-Chi Lee , Chen-Ju Liu , Chin-Wen Lee
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers hal-01586587v1

Data and Applications Security and Privacy XXV

Yingjiu Li
Springer, LNCS-6818, 2011, Lecture Notes in Computer Science, 978-3-642-22347-1. ⟨10.1007/978-3-642-22348-8⟩
Books hal-01586570v1
Image document

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach

Valentina Ciriani , Sabrina De Capitani Di Vimercati , Sara Foresti , Giovanni Livraga , Pierangela Samarati
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.44-59, ⟨10.1007/978-3-642-22348-8_6⟩
Conference papers hal-01586589v1
Image document

Re-designing the Web’s Access Control System

Wenliang Du , Xi Tan , Tongbo Luo , Karthick Jayaraman , Zutao Zhu
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers hal-01586586v1
Image document

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC

Solomon Berhe , Steven Demurjian , Swapna Gokhale , Jaime Pavlich-Mariscal , Rishi Saripalle
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.293-300, ⟨10.1007/978-3-642-22348-8_25⟩
Conference papers hal-01586593v1
Image document

N-Gram Based Secure Similar Document Detection

Wei Jiang , Bharath K. Samanthula
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.239-246, ⟨10.1007/978-3-642-22348-8_19⟩
Conference papers hal-01586584v1
Image document

Query Processing in Private Data Outsourcing Using Anonymization

Ahmet Erhan Nergiz , Chris Clifton
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.138-153, ⟨10.1007/978-3-642-22348-8_12⟩
Conference papers hal-01586588v1
Image document

Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning

Varun Dutt , Young-Suk Ahn , Cleotilde Gonzalez
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.280-292, ⟨10.1007/978-3-642-22348-8_24⟩
Conference papers hal-01586581v1
Image document

Verifiable Secret Sharing with Comprehensive and Efficient Public Verification

Kun Peng
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.217-230, ⟨10.1007/978-3-642-22348-8_17⟩
Conference papers hal-01586582v1
Image document

Information Flow Containment: A Practical Basis for Malware Defense

R. Sekar
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.1-3, ⟨10.1007/978-3-642-22348-8_1⟩
Conference papers hal-01586591v1
Image document

Cooperative Data Access in Multi-cloud Environments

Meixing Le , Krishna Kant , Sushil Jajodia
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.14-28, ⟨10.1007/978-3-642-22348-8_4⟩
Conference papers hal-01586583v1
Image document

Enhancing CardSpace Authentication Using a Mobile Device

Haitham S. Al-Sinani , Chris J. Mitchell
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.201-216, ⟨10.1007/978-3-642-22348-8_16⟩
Conference papers hal-01586573v1
Image document

Private Database Search with Sublinear Query Time

Keith B. Frikken , Boyang Li
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.154-169, ⟨10.1007/978-3-642-22348-8_13⟩
Conference papers hal-01586594v1
Image document

Preserving Privacy in Structural Neuroimages

Nakeisha Schimke , Mary Kuehler , John Hale
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.301-308, ⟨10.1007/978-3-642-22348-8_26⟩
Conference papers hal-01586590v1
Image document

Multilevel Secure Data Stream Processing

Raman Adaikkalavan , Indrakshi Ray , Xing Xie
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.122-137, ⟨10.1007/978-3-642-22348-8_11⟩
Conference papers hal-01586572v1
Image document

Accurate Accident Reconstruction in VANET

Yuliya Kopylova , Csilla Farkas , Wenyuan Xu
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.271-279, ⟨10.1007/978-3-642-22348-8_23⟩
Conference papers hal-01586576v1
Image document

Efficient Distributed Linear Programming with Limited Disclosure

Yuan Hong , Jaideep Vaidya , Haibing Lu
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.170-185, ⟨10.1007/978-3-642-22348-8_14⟩
Conference papers hal-01586592v1
Image document

A New Leakage-Resilient IBE Scheme in the Relative Leakage Model

Yu Chen , Song Luo , Zhong Chen
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.263-270, ⟨10.1007/978-3-642-22348-8_22⟩
Conference papers hal-01586577v1
Image document

Integrated Management of Security Policies

Stefano Paraboschi
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.12-13, ⟨10.1007/978-3-642-22348-8_3⟩
Conference papers hal-01586574v1
Image document

An Optimization Model for the Extended Role Mining Problem

Emre Uzun , Vijayalakshmi Atluri , Haibing Lu , Jaideep Vaidya
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.76-89, ⟨10.1007/978-3-642-22348-8_8⟩
Conference papers hal-01586595v1
Image document

History-Dependent Inference Control of Queries by Dynamic Policy Adaption

Joachim Biskup
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.106-121, ⟨10.1007/978-3-642-22348-8_10⟩
Conference papers hal-01586585v1