27. DBSec 2013: Newark, NJ, USA
Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
Lingyu Wang, Basit Shafiq
Springer, Lecture Notes in Computer Science 7964, ISBN: 978-3-642-39255-9
Contents
Privacy I
Extending Loose Associations to Multiple Fragments.
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
1-16
Joachim Biskup, Marcel Preuß
17-32
Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring.
Liyue Fan, Li Xiong, Vaidy S. Sunderam
33-48
Access Control
Policy Analysis for Administrative Role Based Access Control without Separate Administration.
Ping Yang, Mikhail I. Gofman, Zijiang Yang
49-64
Toward Mining of Temporal Roles.
Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
65-80
Towards User-Oriented RBAC Model.
Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar
81-96
Cloud Computing
Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France
97-112
TerraCheck: Verification of Dedicated Cloud Storage.
Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing
113-127
Privacy II
Fair Private Set Intersection with a Semi-trusted Arbiter.
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
128-144
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection.
Hiroaki Kikuchi, Jun Sakuma
145-163
Using Safety Constraint for Transactional Dataset Anonymization.
Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi
164-178
Data Outsourcing
Attila Altay Yavuz
179-194
Optimal Re-encryption Strategy for Joins in Encrypted Databases.
Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert
195-210
Mobile Computing
Quantitative Security Risk Assessment of Android Permissions and Applications.
Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala
226-241
A Model for Trust-Based Access Control and Delegation in Mobile Clouds.
Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han
242-257
Short Papers
Result Integrity Verification of Outsourced Frequent Itemset Mining.
Boxiang Dong, Ruilin Liu, Wendy Hui Wang
258-265
An Approach to Select Cost-Effective Risk Countermeasures.
Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen
266-273
Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere
274-281
Rule Enforcement with Third Parties in Secure Cooperative Data Access.
Meixing Le, Krishna Kant, Sushil Jajodia
282-288
Analysis of TRBAC with Dynamic Temporal Role Hierarchies.
Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
297-304