index - Data and Applications Security and Privacy XXVII
   


Full Text Documents

22

Search


Table of Contents
Data and Applications Security and Privacy XXVII
Lingyu Wang, Basit Shafiq (Eds.)
Front Matter

Privacy I


Extending Loose Associations to Multiple Fragments
Sabrina Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
1-16
Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?
Joachim Biskup, Marcel Preuß
17-32
Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring
Liyue Fan, Li Xiong, Vaidy Sunderam
33-48

Access Control


Policy Analysis for Administrative Role Based Access Control without Separate Administration
Ping Yang, Mikhail Gofman, Zijiang Yang
49-64
Toward Mining of Temporal Roles
Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
65-80
Towards User-Oriented RBAC Model
Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar
81-96

Cloud Computing


Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations
Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France
97-112
TerraCheck: Verification of Dedicated Cloud Storage
Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing
113-127

Privacy II


Fair Private Set Intersection with a Semi-trusted Arbiter
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
128-144
Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection
Hiroaki Kikuchi, Jun Sakuma
145-163
Using Safety Constraint for Transactional Dataset Anonymization
Bechara Bouna, Chris Clifton, Qutaibah Malluhi
164-178

Data Outsourcing


Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases
Attila Yavuz
179-194
Optimal Re-encryption Strategy for Joins in Encrypted Databases
Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert
195-210
Access Control and Query Verification for Untrusted Databases
Rohit Jain, Sunil Prabhakar
211-225

Mobile Computing


Quantitative Security Risk Assessment of Android Permissions and Applications
Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala
226-241
A Model for Trust-Based Access Control and Delegation in Mobile Clouds
Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook Han
242-257

Short Papers


Result Integrity Verification of Outsourced Frequent Itemset Mining
Boxiang Dong, Ruilin Liu, Hui Wang
258-265
An Approach to Select Cost-Effective Risk Countermeasures
Le Tran, Bjørnar Solhaug, Ketil Stølen
266-273
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase
Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere
274-281
Rule Enforcement with Third Parties in Secure Cooperative Data Access
Meixing Le, Krishna Kant, Sushil Jajodia
282-288
Unlinkable Content Playbacks in a Multiparty DRM System
Ronald Petrlic, Stephan Sekula
289-296
Analysis of TRBAC with Dynamic Temporal Role Hierarchies
Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
297-304

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/