26. DBSec 2012: Paris, France
Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings
Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro
Springer, Lecture Notes in Computer Science 7371, ISBN: 978-3-642-31539-8
Contents
Invited Paper
Access Control
A User-to-User Relationship-Based Access Control Model for Online Social Networks.
Yuan Cheng, Jaehong Park, Ravi S. Sandhu
8-24
Automated and Efficient Analysis of Role-Based Access Control with Attributes.
Alessandro Armando, Silvio Ranise
25-40
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC.
Xin Jin, Ram Krishnan, Ravi S. Sandhu
41-55
Confidentiality and Privacy
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann
56-73
Privacy Consensus in Anonymization Systems via Game Theory.
Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini
74-89
Smart Cards Security (Short Papers)
Security Vulnerabilities of User Authentication Scheme Using Smart Card.
Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi
106-113
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.
Ding Wang, Chunguang Ma, Peng Wu
114-121
A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard.
Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet
122-128
Privacy-Preserving Technologies
Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.
Robert Nix, Murat Kantarcioglu, Keesook J. Han
129-144
Security Limitations of Using Secret Sharing for Data Outsourcing.
Jonathan L. Dautrich Jr., Chinya V. Ravishankar
145-160
Privacy-Preserving Subgraph Discovery.
Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri
161-176
Data Management
From MDM to DB2: A Case Study of Security Enforcement Migration.
Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run
207-222
Intrusion and Malware
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks.
Smitha Sundareswaran, Anna Cinzia Squicciarini
223-238
Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.
Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani M. Thuraisingham
239-254
Probabilistic Attacks and Protection (Short Papers)
Layered Security Architecture for Masquerade Attack Detection.
Hamed Saljooghinejad, Wilson Naik Bhukya
255-262
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.
Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili
263-273
Reconstruction Attack through Classifier Analysis.
Sébastien Gambs, Ahmed Gmati, Michel Hurfin
274-281
Cloud Computing
Distributed Data Federation without Disclosure of User Existence.
Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga
282-297
Improving Virtualization Security by Splitting Hypervisor into Smaller Components.
Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing
298-313
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga
314-329