Table of Contents
|
Data and Applications Security and Privacy XXVII Lingyu Wang, Basit Shafiq (Eds.)
|
Front Matter |
Privacy I
|
Extending Loose Associations to Multiple Fragments Sabrina Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati |
1-16 |
Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret? Joachim Biskup, Marcel Preuß |
17-32 |
Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring Liyue Fan, Li Xiong, Vaidy Sunderam |
33-48 |
Access Control
|
Policy Analysis for Administrative Role Based Access Control without Separate Administration Ping Yang, Mikhail Gofman, Zijiang Yang |
49-64 |
Toward Mining of Temporal Roles Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
65-80 |
Towards User-Oriented RBAC Model Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar |
81-96 |
Cloud Computing
|
Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France |
97-112 |
TerraCheck: Verification of Dedicated Cloud Storage Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing |
113-127 |
Privacy II
|
Fair Private Set Intersection with a Semi-trusted Arbiter Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello |
128-144 |
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection Hiroaki Kikuchi, Jun Sakuma |
145-163 |
Using Safety Constraint for Transactional Dataset Anonymization Bechara Bouna, Chris Clifton, Qutaibah Malluhi |
164-178 |
Data Outsourcing
|
Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases Attila Yavuz |
179-194 |
Optimal Re-encryption Strategy for Joins in Encrypted Databases Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert |
195-210 |
Access Control and Query Verification for Untrusted Databases Rohit Jain, Sunil Prabhakar |
211-225 |
Mobile Computing
|
Quantitative Security Risk Assessment of Android Permissions and Applications Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala |
226-241 |
A Model for Trust-Based Access Control and Delegation in Mobile Clouds Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook Han |
242-257 |
Short Papers
|
Result Integrity Verification of Outsourced Frequent Itemset Mining Boxiang Dong, Ruilin Liu, Hui Wang |
258-265 |
An Approach to Select Cost-Effective Risk Countermeasures Le Tran, Bjørnar Solhaug, Ketil Stølen |
266-273 |
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere |
274-281 |
Rule Enforcement with Third Parties in Secure Cooperative Data Access Meixing Le, Krishna Kant, Sushil Jajodia |
282-288 |
Unlinkable Content Playbacks in a Multiparty DRM System Ronald Petrlic, Stephan Sekula |
289-296 |
Analysis of TRBAC with Dynamic Temporal Role Hierarchies Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural |
297-304 |