Search - LNCS 8566: Data and Applications Security and Privacy XXVIII Access content directly

Filter your results

24 results
Contributor/author Internal identifier : 200187
Image document

Hunting the Unknown

Elisa Costante , Jerry Den Hartog , Milan Petković , Sandro Etalle , Mykola Pechenizkiy
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.243-259, ⟨10.1007/978-3-662-43936-4_16⟩
Conference papers hal-01284860v1
Image document

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure

Yuan Hong , Jaideep Vaidya , Haibing Lu , Lingyu Wang
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.179-194, ⟨10.1007/978-3-662-43936-4_12⟩
Conference papers hal-01284854v1
Image document

Attribute-Aware Relationship-Based Access Control for Online Social Networks

Yuan Cheng , Jaehong Park , Ravi Sandhu
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.292-306, ⟨10.1007/978-3-662-43936-4_19⟩
Conference papers hal-01284863v1
Image document

LPM: Layered Policy Management for Software-Defined Networks

Wonkyu Han , Hongxin Hu , Gail-Joon Ahn
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.356-363, ⟨10.1007/978-3-662-43936-4_23⟩
Conference papers hal-01284871v1
Image document

Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials

David Derler , Christian Hanser , Daniel Slamanig
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.49-65, ⟨10.1007/978-3-662-43936-4_4⟩
Conference papers hal-01284842v1
Image document

Randomly Partitioned Encryption for Cloud Databases

Tahmineh Sanamrad , Lucas Braun , Donald Kossmann , Ramarathnam Venkatesan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.307-323, ⟨10.1007/978-3-662-43936-4_20⟩
Conference papers hal-01284865v1
Image document

On Minimizing the Size of Encrypted Databases

Giovanni Di Crescenzo , David Shallcross
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.364-372, ⟨10.1007/978-3-662-43936-4_24⟩
Conference papers hal-01284872v1
Image document

FSquaDRA: Fast Detection of Repackaged Applications

Yury Zhauniarovich , Olga Gadyatskaya , Bruno Crispo , Francesco La Spina , Ermanno Moser
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers hal-01285035v1
Image document

Who, When, and Where? Location Proof Assertion for Mobile Devices

Rasib Khan , Shams Zawoad , Md Munirul Haque , Ragib Hasan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.146-162, ⟨10.1007/978-3-662-43936-4_10⟩
Conference papers hal-01285030v1
Image document

A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters

Vikas G. Ashok , Ravi Mukkamala
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.382-389, ⟨10.1007/978-3-662-43936-4_26⟩
Conference papers hal-01284874v1

Data and Applications Security and Privacy XXVIII

Vijay Atluri , Günther Pernul
Springer, Lecture Notes in Computer Science (LNCS-8566), 2014, 978-3-662-45501-2. ⟨10.1007/978-3-662-43936-4⟩
Books hal-01285073v1
Image document

Incremental Analysis of Evolving Administrative Role Based Access Control Policies

Silvio Ranise , Anh Truong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.260-275, ⟨10.1007/978-3-662-43936-4_17⟩
Conference papers hal-01285032v1
Image document

Dynamic Workflow Adjustment with Security Constraints

Haibing Lu , Yuan Hong , Yanjiang Yang , Yi Fang , Lian Duan
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.211-226, ⟨10.1007/978-3-662-43936-4_14⟩
Conference papers hal-01284857v1
Image document

Toward Software Diversity in Heterogeneous Networked Systems

Chu Huang , Sencun Zhu , Robert Erbacher
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.114-129, ⟨10.1007/978-3-662-43936-4_8⟩
Conference papers hal-01284848v1
Image document

Design Patterns for Multiple Stakeholders in Social Computing

Pooya Mehregan , Philip L. Fong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.163-178, ⟨10.1007/978-3-662-43936-4_11⟩
Conference papers hal-01284852v1
Image document

Consistent Query Plan Generation in Secure Cooperative Data Access

Meixing Le , Krishna Kant , Sushil Jajodia
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.227-242, ⟨10.1007/978-3-662-43936-4_15⟩
Conference papers hal-01284858v1
Image document

Integrity Assurance for Outsourced Databases without DBMS Modification

Wei Wei , Ting Yu
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.1-16, ⟨10.1007/978-3-662-43936-4_1⟩
Conference papers hal-01284838v1
Image document

Efficient and Enhanced Solutions for Content Sharing in DRM Systems

Michal Davidson , Ehud Gudes , Tamir Tassa
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.373-381, ⟨10.1007/978-3-662-43936-4_25⟩
Conference papers hal-01284873v1
Image document

Data Leakage Quantification

Sokratis Vavilis , Milan Petković , Nicola Zannone
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.98-113, ⟨10.1007/978-3-662-43936-4_7⟩
Conference papers hal-01284845v1
Image document

Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database

Giovanni Di Crescenzo , Debra Cook , Allen Mcintosh , Euthimios Panagos
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.339-355, ⟨10.1007/978-3-662-43936-4_22⟩
Conference papers hal-01284868v1
Image document

Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud

Samira Barouti , Feras Aljumah , Dima Alhadidi , Mourad Debbabi
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.82-97, ⟨10.1007/978-3-662-43936-4_6⟩
Conference papers hal-01284843v1
Image document

Mining Attribute-Based Access Control Policies from Logs

Zhongyuan Xu , Scott D. Stoller
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.276-291, ⟨10.1007/978-3-662-43936-4_18⟩
Conference papers hal-01284862v1
Image document

Towards Secure Cloud Database with Fine-Grained Access Control

Michael G. Solomon , Vaidy Sunderam , Li Xiong
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.324-338, ⟨10.1007/978-3-662-43936-4_21⟩
Conference papers hal-01284867v1
Image document

Optimizing Integrity Checks for Join Queries in the Cloud

Sabrina De Capitani Di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.33-48, ⟨10.1007/978-3-662-43936-4_3⟩
Conference papers hal-01284840v1