DBSec B

21 papers

YearTitle / Authors
2007A Privacy-Enhanced Attribute-Based Access Control System.
Jan Paul Kolter, Rolf Schillinger, Günther Pernul
2007A Scalable and Secure Cryptographic Service.
Shouhuai Xu, Ravi S. Sandhu
2007A Spatio-temporal Role-Based Access Control Model.
Indrakshi Ray, Manachai Toahchoodee
2007Authenticated Relational Tables and Authenticated Skip Lists.
Giuseppe Di Battista, Bernardo Palazzi
2007Confidentiality Policies for Controlled Query Evaluation.
Joachim Biskup, Torben Weibert
2007Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings
Steve Barker, Gail-Joon Ahn
2007Design and Analysis of Querying Encrypted Data in Relational Databases.
Mustafa Canim, Murat Kantarcioglu
2007Dynamic Event-Based Access Control as Term Rewriting.
Clara Bertolissi, Maribel Fernández, Steve Barker
2007Efficient Security Policy Enforcement in a Location Based Service Environment.
Vijayalakshmi Atluri, Heechang Shin
2007Enforcing Honesty in Assured Information Sharing Within a Distributed System.
Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham
2007Location Privacy Protection Through Obfuscation-Based Techniques.
Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
2007Measuring the Overall Security of Network Configurations Using Attack Graphs.
Lingyu Wang, Anoop Singhal, Sushil Jajodia
2007New Paradigm of Inference Control with Trusted Computing.
Yanjiang Yang, Yingjiu Li, Robert H. Deng
2007Privacy-Preserving Schema Matching Using Mutual Information.
Isabel F. Cruz, Roberto Tamassia, Danfeng Yao
2007Provably-Secure Schemes for Basic Query Support in Outsourced Databases.
Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill
2007Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray
2007Security Patterns for Physical Access Control Systems.
Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie
2007The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.
Anna Zych, Milan Petkovic, Willem Jonker
2007Towards a Times-Based Usage Control Model.
Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin
2007XACML Policies for Exclusive Resource Usage.
Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera
2007gVault: A Gmail Based Cryptographic Network File System.
Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian