IFIP TC6 Open Digital Library

27. DBSec 2013: Newark, NJ, USA

Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings

Lingyu Wang, Basit Shafiq

Springer, Lecture Notes in Computer Science 7964, ISBN: 978-3-642-39255-9



Contents

Privacy I

Extending Loose Associations to Multiple Fragments.

Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati

 1-16

Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?

Joachim Biskup, Marcel Preuß

 17-32

Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring.

Liyue Fan, Li Xiong, Vaidy S. Sunderam

 33-48

Access Control

Policy Analysis for Administrative Role Based Access Control without Separate Administration.

Ping Yang, Mikhail I. Gofman, Zijiang Yang

 49-64

Toward Mining of Temporal Roles.

Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya

 65-80

Towards User-Oriented RBAC Model.

Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar

 81-96

Cloud Computing

Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations.

Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France

 97-112

TerraCheck: Verification of Dedicated Cloud Storage.

Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing

 113-127

Privacy II

Fair Private Set Intersection with a Semi-trusted Arbiter.

Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello

 128-144

Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection.

Hiroaki Kikuchi, Jun Sakuma

 145-163

Using Safety Constraint for Transactional Dataset Anonymization.

Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi

 164-178

Data Outsourcing

Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases.

Attila Altay Yavuz

 179-194

Optimal Re-encryption Strategy for Joins in Encrypted Databases.

Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert

 195-210

Access Control and Query Verification for Untrusted Databases.

Rohit Jain, Sunil Prabhakar

 211-225

Mobile Computing

Quantitative Security Risk Assessment of Android Permissions and Applications.

Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala

 226-241

A Model for Trust-Based Access Control and Delegation in Mobile Clouds.

Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han

 242-257

Short Papers

Result Integrity Verification of Outsourced Frequent Itemset Mining.

Boxiang Dong, Ruilin Liu, Wendy Hui Wang

 258-265

An Approach to Select Cost-Effective Risk Countermeasures.

Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen

 266-273

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.

Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere

 274-281

Rule Enforcement with Third Parties in Secure Cooperative Data Access.

Meixing Le, Krishna Kant, Sushil Jajodia

 282-288

Unlinkable Content Playbacks in a Multiparty DRM System.

Ronald Petrlic, Stephan Sekula

 289-296

Analysis of TRBAC with Dynamic Temporal Role Hierarchies.

Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural

 297-304