index - Data and Applications Security and Privacy XXV
   


Full Text Documents

26

Search


Table of Contents
Data and Applications Security and Privacy XXV
Yingjiu Li (Ed.)
Front Matter

Invited Papers


Information Flow Containment: A Practical Basis for Malware Defense
R. Sekar
1-3
Re-designing the Web’s Access Control System
Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu
4-11
Integrated Management of Security Policies
Stefano Paraboschi
12-13

Access Control I


Cooperative Data Access in Multi-cloud Environments
Meixing Le, Krishna Kant, Sushil Jajodia
14-28
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Hongxin Hu, Gail-Joon Ahn
29-43

Privacy-Preserving Data Applications I


Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach
Valentina Ciriani, Sabrina Capitani Di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
44-59
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity
Florian Kerschbaum
60-75

Access Control II


An Optimization Model for the Extended Role Mining Problem
Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya
76-89
Dynamics in Delegation and Revocation Schemes: A Logical Approach
Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert Van Der Torre
90-105

Data Confidentiality and Query Verification


History-Dependent Inference Control of Queries by Dynamic Policy Adaption
Joachim Biskup
106-121
Multilevel Secure Data Stream Processing
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
122-137

Query and Data Privacy


Query Processing in Private Data Outsourcing Using Anonymization
Ahmet Nergiz, Chris Clifton
138-153
Private Database Search with Sublinear Query Time
Keith Frikken, Boyang Li
154-169

Privacy-Preserving Data Applications II


Efficient Distributed Linear Programming with Limited Disclosure
Yuan Hong, Jaideep Vaidya, Haibing Lu
170-185
Privacy-Preserving Data Mining: A Game-Theoretic Approach
Atsuko Miyaji, Mohammad Rahman
186-200

Authentication and Secret Sharing


Enhancing CardSpace Authentication Using a Mobile Device
Haitham Al-Sinani, Chris Mitchell
201-216
Verifiable Secret Sharing with Comprehensive and Efficient Public Verification
Kun Peng
217-230

Short Papers


A Robust Remote User Authentication Scheme against Smart Card Security Breach
Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee
231-238
N-Gram Based Secure Similar Document Detection
Wei Jiang, Bharath Samanthula
239-246
An Index Structure for Private Data Outsourcing
Aaron Steele, Keith Frikken
247-254
Selective Disclosure on Encrypted Documents
Hao Lei, Dengguo Feng
255-262
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model
Yu Chen, Song Luo, Zhong Chen
263-270
Accurate Accident Reconstruction in VANET
Yuliya Kopylova, Csilla Farkas, Wenyuan Xu
271-279
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning
Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez
280-292
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC
Solomon Berhe, Steven Demurjian, Swapna Gokhale, Jaime Pavlich-Mariscal, Rishi Saripalle
293-300
Preserving Privacy in Structural Neuroimages
Nakeisha Schimke, Mary Kuehler, John Hale
301-308

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/