DBSec B

26 papers

YearTitle / Authors
2008A New Approach to Secure Logging.
Di Ma, Gene Tsudik
2008A Privacy-Preserving Ticketing System.
Kristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe
2008A Unified Audit Expression Model for Auditing SQL Queries.
Vikram Goyal, Shyam K. Gupta, Anand Gupta
2008An Attack Graph-Based Probabilistic Security Metric.
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia
2008An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
2008DIWeDa - Detecting Intrusions in Web Databases.
Alex Roichman, Ehud Gudes
2008Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings
Vijay Atluri
2008Dynamic Meta-level Access Control in SQL.
Steve Barker
2008Empirical Analysis of Certificate Revocation Lists.
Daryl Walleck, Yingjiu Li, Shouhuai Xu
2008Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure.
Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky
2008On the Applicability of Trusted Computing in Distributed Authorization Using Web Services.
Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora
2008On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model.
Manachai Toahchoodee, Indrakshi Ray
2008P4A: A New Privacy Model for XML.
Angela Cristina Duta, Ken Barker
2008Panel Session: What Are the Key Challenges in Distributed Security?.
Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham
2008Privacy-Aware Collaborative Access Control in Web-Based Social Networks.
Barbara Carminati, Elena Ferrari
2008Protecting the Publishing Identity in Multiple Tuples.
Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang
2008Regulating Exceptions in Healthcare Using Policy Spaces.
Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati
2008Secure Construction of Contingency Tables from Distributed Data.
Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam
2008Securing Workflows with XACML, RDF and BPEL.
Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera
2008Security, Functionality and Scale?
Ross J. Anderson
2008Shared and Searchable Encrypted Data for Untrusted Servers.
Changyu Dong, Giovanni Russello, Naranker Dulay
2008Sharing but Protecting Content Against Internal Leakage for Organisations.
Muntaha Alawneh, Imad M. Abbadi
2008The Analysis of Windows Vista Disk Encryption Algorithm.
Mohamed Abo El-Fotouh, Klaus Diepold
2008Towards Automation of Testing High-Level Security Properties.
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad Debbabi
2008Using New Tools for Certificate Repositories Generation in MANETs.
Candelaria Hernández-Goya, Pino Caballero-Gil, Oscar Delgado-Mohatar, Jezabel Molina-Gil, Cándido Caballero-Gil
2008Web Services Security: Techniques and Challenges (Extended Abstract).
Anoop Singhal