DBSec B

28 papers

YearTitle / Authors
2010A Labelling System for Derived Data Control.
Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu
2010A Logic of Privacy.
Steve Barker, Valerio Genovese
2010A Secure RFID Ticket System for Public Transport.
Kun Peng, Feng Bao
2010An Access Control Model for Web Databases.
Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene Ayachi
2010Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach.
Ramaswamy Chandramouli
2010Constructing Key Assignment Schemes from Chain Partitions.
Jason Crampton, Rosli Daud, Keith M. Martin
2010Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
Sara Foresti, Sushil Jajodia
2010Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach.
Alex Hai Wang
2010Distributed and Secure Access Control in P2P Databases.
Angela Bonifati, Ruilin Liu, Wendy Hui Wang
2010Efficient Inference Control for Open Relational Queries.
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner
2010Enforcing Request Integrity in Web Applications.
Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin
2010Evaluating the Risk of Adopting RBAC Roles.
Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde
2010Generalizing PIR for Practical Private Retrieval of Public Data.
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
2010Mining Likely Properties of Access Control Policies via Association Rule Mining.
Jeehyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay
2010Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems.
Hasan Qunoo, Mark Ryan
2010Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms.
Aarthi Nagarajan, Vijay Varadharajan
2010On the Identification of Property Based Generalizations in Microdata Anonymization.
Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley
2010Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols.
Suratose Tritilanunt
2010Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance.
Amril Syalim, Takashi Nishide, Kouichi Sakurai
2010Query Racing: Fast Completeness Certification of Query Results.
Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco
2010Role Mining in the Presence of Noise.
Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu
2010Scalable and Efficient Reasoning for Enforcing Role-Based Access Control.
Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham
2010Secure Location Verification - A Security Analysis of GPS Signal Authentication.
Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar
2010Secure Outsourcing of DNA Searching via Finite Automata.
Marina Blanton, Mehrdad Aliasgari
2010Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms.
Jan Zibuschka, Matthias Herbert, Heiko Rossnagel
2010Understanding Privacy Risk of Publishing Decision Trees.
Zutao Zhu, Wenliang Du
2010Using Trust-Based Information Aggregation for Predicting Security Level of Systems.
Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray
2010When ABE Meets RSS.
Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen