index - Data and Applications Security and Privacy XXVII
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Data and Applications Security and Privacy XXVII
Lingyu Wang, Basit Shafiq (Eds.)
Front Matter

Privacy I


Extending Loose Associations to Multiple Fragments
Sabrina Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
1-16
Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?
Joachim Biskup, Marcel Preuß
17-32
Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring
Liyue Fan, Li Xiong, Vaidy Sunderam
33-48

Access Control


Policy Analysis for Administrative Role Based Access Control without Separate Administration
Ping Yang, Mikhail Gofman, Zijiang Yang
49-64
Toward Mining of Temporal Roles
Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
65-80
Towards User-Oriented RBAC Model
Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar
81-96

Cloud Computing


Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations
Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France
97-112
TerraCheck: Verification of Dedicated Cloud Storage
Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing
113-127

Privacy II


Fair Private Set Intersection with a Semi-trusted Arbiter
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
128-144
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection
Hiroaki Kikuchi, Jun Sakuma
145-163
Using Safety Constraint for Transactional Dataset Anonymization
Bechara Bouna, Chris Clifton, Qutaibah Malluhi
164-178

Data Outsourcing


Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases
Attila Yavuz
179-194
Optimal Re-encryption Strategy for Joins in Encrypted Databases
Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert
195-210
Access Control and Query Verification for Untrusted Databases
Rohit Jain, Sunil Prabhakar
211-225

Mobile Computing


Quantitative Security Risk Assessment of Android Permissions and Applications
Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala
226-241
A Model for Trust-Based Access Control and Delegation in Mobile Clouds
Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook Han
242-257

Short Papers


Result Integrity Verification of Outsourced Frequent Itemset Mining
Boxiang Dong, Ruilin Liu, Hui Wang
258-265
An Approach to Select Cost-Effective Risk Countermeasures
Le Tran, Bjørnar Solhaug, Ketil Stølen
266-273
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase
Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere
274-281
Rule Enforcement with Third Parties in Secure Cooperative Data Access
Meixing Le, Krishna Kant, Sushil Jajodia
282-288
Unlinkable Content Playbacks in a Multiparty DRM System
Ronald Petrlic, Stephan Sekula
289-296
Analysis of TRBAC with Dynamic Temporal Role Hierarchies
Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
297-304

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/