IFIP TC6 Open Digital Library

26. DBSec 2012: Paris, France

Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings

Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro

Springer, Lecture Notes in Computer Science 7371, ISBN: 978-3-642-31539-8



Contents

Invited Paper

Logics for Security and Privacy.

Leendert van der Torre

 1-7

Access Control

A User-to-User Relationship-Based Access Control Model for Online Social Networks.

Yuan Cheng, Jaehong Park, Ravi S. Sandhu

 8-24

Automated and Efficient Analysis of Role-Based Access Control with Attributes.

Alessandro Armando, Silvio Ranise

 25-40

A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC.

Xin Jin, Ram Krishnan, Ravi S. Sandhu

 41-55

Confidentiality and Privacy

Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies.

Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann

 56-73

Privacy Consensus in Anonymization Systems via Game Theory.

Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini

 74-89

Uniform Obfuscation for Location Privacy.

Gianluca Dini, Pericle Perazzo

 90-105

Smart Cards Security (Short Papers)

Security Vulnerabilities of User Authentication Scheme Using Smart Card.

Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi

 106-113

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.

Ding Wang, Chunguang Ma, Peng Wu

 114-121

A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard.

Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet

 122-128

Privacy-Preserving Technologies

Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.

Robert Nix, Murat Kantarcioglu, Keesook J. Han

 129-144

Security Limitations of Using Secret Sharing for Data Outsourcing.

Jonathan L. Dautrich Jr., Chinya V. Ravishankar

 145-160

Privacy-Preserving Subgraph Discovery.

Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri

 161-176

Data Management

Decentralized Semantic Threat Graphs.

Simon N. Foley, William M. Fitzgerald

 177-192

Code Type Revealing Using Experiments Framework.

Rami Sharon, Ehud Gudes

 193-206

From MDM to DB2: A Case Study of Security Enforcement Migration.

Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run

 207-222

Intrusion and Malware

XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks.

Smitha Sundareswaran, Anna Cinzia Squicciarini

 223-238

Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.

Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani M. Thuraisingham

 239-254

Probabilistic Attacks and Protection (Short Papers)

Layered Security Architecture for Masquerade Attack Detection.

Hamed Saljooghinejad, Wilson Naik Bhukya

 255-262

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.

Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili

 263-273

Reconstruction Attack through Classifier Analysis.

Sébastien Gambs, Ahmed Gmati, Michel Hurfin

 274-281

Cloud Computing

Distributed Data Federation without Disclosure of User Existence.

Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga

 282-297

Improving Virtualization Security by Splitting Hypervisor into Smaller Components.

Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing

 298-313

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.

Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga

 314-329