Data and Applications Security and Privacy XXVIII Vijay Atluri, Günther Pernul (Eds.)
|
Front Matter |
Integrity Assurance for Outsourced Databases without DBMS Modification Wei Wei, Ting Yu |
1-16 |
Specification and Deployment of Integrated Security Policies for Outsourced Data Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard |
17 - 32 |
Optimizing Integrity Checks for Join Queries in the Cloud Sabrina Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
33-48 |
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials David Derler, Christian Hanser, Daniel Slamanig |
49-65 |
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray |
66 - 81 |
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi |
82-97 |
Data Leakage Quantification Sokratis Vavilis, Milan Petković, Nicola Zannone |
98-113 |
Toward Software Diversity in Heterogeneous Networked Systems Chu Huang, Sencun Zhu, Robert Erbacher |
114-129 |
FSquaDRA: Fast Detection of Repackaged Applications Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser |
130-145 |
Who, When, and Where? Location Proof Assertion for Mobile Devices Rasib Khan, Shams Zawoad, Md Haque, Ragib Hasan |
146-162 |
Design Patterns for Multiple Stakeholders in Social Computing Pooya Mehregan, Philip Fong |
163-178 |
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang |
179-194 |
ELITE: zEro Links Identity managemenT systEm Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray |
195 - 210 |
Dynamic Workflow Adjustment with Security Constraints Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, Lian Duan |
211-226 |
Consistent Query Plan Generation in Secure Cooperative Data Access Meixing Le, Krishna Kant, Sushil Jajodia |
227-242 |
Hunting the Unknown Elisa Costante, Jerry Hartog, Milan Petković, Sandro Etalle, Mykola Pechenizkiy |
243-259 |
Incremental Analysis of Evolving Administrative Role Based Access Control Policies Silvio Ranise, Anh Truong |
260-275 |
Mining Attribute-Based Access Control Policies from Logs Zhongyuan Xu, Scott Stoller |
276-291 |
Attribute-Aware Relationship-Based Access Control for Online Social Networks Yuan Cheng, Jaehong Park, Ravi Sandhu |
292-306 |
Randomly Partitioned Encryption for Cloud Databases Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, Ramarathnam Venkatesan |
307-323 |
Towards Secure Cloud Database with Fine-Grained Access Control Michael Solomon, Vaidy Sunderam, Li Xiong |
324-338 |
Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database Giovanni Crescenzo, Debra Cook, Allen Mcintosh, Euthimios Panagos |
339-355 |
LPM: Layered Policy Management for Software-Defined Networks Wonkyu Han, Hongxin Hu, Gail-Joon Ahn |
356-363 |
On Minimizing the Size of Encrypted Databases Giovanni Crescenzo, David Shallcross |
364-372 |
Efficient and Enhanced Solutions for Content Sharing in DRM Systems Michal Davidson, Ehud Gudes, Tamir Tassa |
373-381 |
A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters Vikas Ashok, Ravi Mukkamala |
382-389 |