Table of Contents
|
Data and Applications Security and Privacy XXIX Pierangela Samarati |
Front Matter |
Data Anonymization and Computation
|
MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce Neelam Memon, Jianhua Shao |
3-18 |
Towards Collaborative Query Planning in Multi-party Database Networks Mingyi Zhao, Peng Liu, Jorge Lobo |
19-34 |
Privacy-Preserving Range Queries from Keyword Queries Giovanni Crescenzo, Abhrajit Ghosh |
35-50 |
Access Control and Authorization
|
An Administrative Model for Relationship-Based Access Control Scott Stoller |
53-68 |
Migrating from DAC to RBAC Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural |
69-84 |
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios Daniel Santos, Silvio Ranise, Luca Compagna, Serena Ponta |
85-100 |
User Privacy
|
Privacy Preserving Record Matching Using Automated Semi-trusted Broker Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael Kahn, Frederic Cuppens, Nora Cuppens |
103-118 |
Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid Hu Chun, Kui Ren, Wei Jiang |
119-134 |
Privacy-Preserving Public Transport Ticketing System Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart Decker |
135-150 |
Authentication and Information Integration
|
Expiration and Revocation of Keys for Attribute-Based Signatures Stephen Tate, Roopa Vishwanathan |
153-169 |
Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis Euijin Choo, Ting Yu, Min Chi |
170-187 |
Constructing Inference-Proof Belief Mediators Joachim Biskup, Cornelia Tadros |
188-203 |
Privacy and Trust
|
Personalized Composition of Trustful Reputation Systems Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul |
207-214 |
FamilyID: A Hybrid Approach to Identify Family Information from Microblogs Jamuna Gopal, Shu Huang, Bo Luo |
215-222 |
Sanitization of Call Detail Records via Differentially-Private Bloom Filters Mohammad Alaggan, Sébastien Gambs, Stan Matwin, Mohammed Tuhin |
223-230 |
Access Control and Usage Policies
|
Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System Annanda Rath, Jean-Noël Colin |
233-241 |
Integrating Attributes into Role-Based Access Control Qasim Rajpoot, Christian Jensen, Ram Krishnan |
242-249 |
Automated Translation of End User Policies for Usage Control Enforcement Prachi Kumari, Alexander Pretschner |
250-258 |
Network and Internet Security
|
Defensive Resource Allocations with Security Chokepoints in IPv6 Networks Assane Gueye, Peter Mell, Richard Harang, Richard La |
261-276 |
A Topology Based Flow Model for Computing Domain Reputation Igor Mishsky, Nurit Gal-Oz, Ehud Gudes |
277-292 |
FPGuard: Detection and Prevention of Browser Fingerprinting Amin Faizkhademi, Mohammad Zulkernine, Komminist Weldemariam |
293-308 |
Information Flow and Inference
|
Stream Processing with Secure Information Flow Constraints Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose Gamble |
311-329 |
Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones |
330-345 |
Inference Leakage Detection for Authorization Policies over RDF Data Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid |
346-361 |