DBSec B

23 papers

YearTitle / Authors
2009A Trust-Based Access Control Model for Pervasive Computing Applications.
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray
2009An Approach to Security Policy Configuration Using Semantic Threat Graphs.
Simon N. Foley, William M. Fitzgerald
2009Analysis of Data Dependency Based Intrusion Detection System.
Yermek Nugmanov, Brajendra Panda, Yi Hu
2009Building an Application Data Behavior Model for Intrusion Detection.
Olivier Sarrouy, Eric Totel, Bernard Jouga
2009Controlled Query Evaluation and Inference-Free View Updates.
Joachim Biskup, Jens Seiler, Torben Weibert
2009Data Is Key: Introducing the Data-Based Access Control Paradigm.
Wolter Pieters, Qiang Tang
2009Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings
Ehud Gudes, Jaideep Vaidya
2009Detecting Inference Channels in Private Multimedia Data via Social Networks.
Bechara al Bouna, Richard Chbeir
2009Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers.
Pawel Jurczyk, Li Xiong
2009Distributed Privilege Enforcement in PACS.
Christoph Sturm, Ela Hunt, Marc H. Scholl
2009Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC.
Solomon Berhe, Steven A. Demurjian, Thomas Agresta
2009Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
2009Implementing Reflective Access Control in SQL.
Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett
2009Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology.
Stephen R. Tate, Roopa Vishwanathan
2009Methods for Computing Trust and Reputation While Preserving Privacy.
Ehud Gudes, Nurit Gal-Oz, Alon Grubshtein
2009PAES: Policy-Based Authority Evaluation Scheme.
Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu
2009Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation.
Keith B. Frikken
2009Privacy-Preserving Telemonitoring for eHealth.
Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sandikkaya, Bart De Decker, Hans Vangheluwe
2009Reaction Policy Model Based on Dynamic Organizations and Threat Context.
Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens
2009Secure Method Calls by Instrumenting Bytecode with Aspects.
Xiaofeng Yang, Mohammad Zulkernine
2009Spatiotemporal Access Control Enforcement under Uncertain Location Estimates.
Heechang Shin, Vijayalakshmi Atluri
2009Towards System Integrity Protection with Graph-Based Policy Analysis.
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
2009Using Edit Automata for Rewriting-Based Security Enforcement.
Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi