Full Text Documents

26

Search


Table of Contents
Data and Applications Security and Privacy XXV
Yingjiu Li (Ed.)
Front Matter

Invited Papers


Information Flow Containment: A Practical Basis for Malware Defense
R. Sekar
1-3
Re-designing the Web’s Access Control System
Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu
4-11
Integrated Management of Security Policies
Stefano Paraboschi
12-13

Access Control I


Cooperative Data Access in Multi-cloud Environments
Meixing Le, Krishna Kant, Sushil Jajodia
14-28
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Hongxin Hu, Gail-Joon Ahn
29-43

Privacy-Preserving Data Applications I


Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach
Valentina Ciriani, Sabrina Capitani Di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
44-59
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity
Florian Kerschbaum
60-75

Access Control II


An Optimization Model for the Extended Role Mining Problem
Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya
76-89
Dynamics in Delegation and Revocation Schemes: A Logical Approach
Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert Van Der Torre
90-105

Data Confidentiality and Query Verification


History-Dependent Inference Control of Queries by Dynamic Policy Adaption
Joachim Biskup
106-121
Multilevel Secure Data Stream Processing
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
122-137

Query and Data Privacy


Query Processing in Private Data Outsourcing Using Anonymization
Ahmet Nergiz, Chris Clifton
138-153
Private Database Search with Sublinear Query Time
Keith Frikken, Boyang Li
154-169

Privacy-Preserving Data Applications II


Efficient Distributed Linear Programming with Limited Disclosure
Yuan Hong, Jaideep Vaidya, Haibing Lu
170-185
Privacy-Preserving Data Mining: A Game-Theoretic Approach
Atsuko Miyaji, Mohammad Rahman
186-200

Authentication and Secret Sharing


Enhancing CardSpace Authentication Using a Mobile Device
Haitham Al-Sinani, Chris Mitchell
201-216
Verifiable Secret Sharing with Comprehensive and Efficient Public Verification
Kun Peng
217-230

Short Papers


A Robust Remote User Authentication Scheme against Smart Card Security Breach
Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee
231-238
N-Gram Based Secure Similar Document Detection
Wei Jiang, Bharath Samanthula
239-246
An Index Structure for Private Data Outsourcing
Aaron Steele, Keith Frikken
247-254
Selective Disclosure on Encrypted Documents
Hao Lei, Dengguo Feng
255-262
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model
Yu Chen, Song Luo, Zhong Chen
263-270
Accurate Accident Reconstruction in VANET
Yuliya Kopylova, Csilla Farkas, Wenyuan Xu
271-279
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning
Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez
280-292
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC
Solomon Berhe, Steven Demurjian, Swapna Gokhale, Jaime Pavlich-Mariscal, Rishi Saripalle
293-300
Preserving Privacy in Structural Neuroimages
Nakeisha Schimke, Mary Kuehler, John Hale
301-308

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/