IFIP TC6 Open Digital Library

21. DBSec 2007: Redondo Beach, CA, USA

Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings

Steve Barker, Gail-Joon Ahn

Springer, Lecture Notes in Computer Science 4602, ISBN: 978-3-540-73533-5


Secure Query Evaluation

Confidentiality Policies for Controlled Query Evaluation.

Joachim Biskup, Torben Weibert


Provably-Secure Schemes for Basic Query Support in Outsourced Databases.

Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill


Authenticated Relational Tables and Authenticated Skip Lists.

Giuseppe Di Battista, Bernardo Palazzi


Location-Based Security/Mobile Security

Location Privacy Protection Through Obfuscation-Based Techniques.

Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati


Efficient Security Policy Enforcement in a Location Based Service Environment.

Vijayalakshmi Atluri, Heechang Shin


Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.

Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray


Short Papers

Privacy-Preserving Schema Matching Using Mutual Information.

Isabel F. Cruz, Roberto Tamassia, Danfeng Yao


The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.

Anna Zych, Milan Petkovic, Willem Jonker


Distributed Security Issues

Measuring the Overall Security of Network Configurations Using Attack Graphs.

Lingyu Wang, Anoop Singhal, Sushil Jajodia


Enforcing Honesty in Assured Information Sharing Within a Distributed System.

Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham


A Privacy-Enhanced Attribute-Based Access Control System.

Jan Kolter, Rolf Schillinger, Günther Pernul


Cryptographic-Based Security

A Scalable and Secure Cryptographic Service.

Shouhuai Xu, Ravi S. Sandhu


gVault: A Gmail Based Cryptographic Network File System.

Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian


Design and Analysis of Querying Encrypted Data in Relational Databases.

Mustafa Canim, Murat Kantarcioglu


Temporal Access Control and Usage Control

Dynamic Event-Based Access Control as Term Rewriting.

Clara Bertolissi, Maribel Fernández, Steve Barker


A Spatio-temporal Role-Based Access Control Model.

Indrakshi Ray, Manachai Toahchoodee


Towards a Times-Based Usage Control Model.

Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin


System Security Issues

New Paradigm of Inference Control with Trusted Computing.

Yanjiang Yang, Yingjiu Li, Robert H. Deng


Security Patterns for Physical Access Control Systems.

Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie


XACML Policies for Exclusive Resource Usage.

Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera