DBSec B

27 papers

YearTitle / Authors
2011A New Leakage-Resilient IBE Scheme in the Relative Leakage Model.
Yu Chen, Song Luo, Zhong Chen
2011A Robust Remote User Authentication Scheme against Smart Card Security Breach.
Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee
2011Accurate Accident Reconstruction in VANET.
Yuliya Kopylova, Csilla Farkas, Wenyuan Xu
2011An Index Structure for Private Data Outsourcing.
Aaron Steele, Keith B. Frikken
2011An Optimization Model for the Extended Role Mining Problem.
Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya
2011Cooperative Data Access in Multi-cloud Environments.
Meixing Le, Krishna Kant, Sushil Jajodia
2011Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning.
Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez
2011Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings
Yingjiu Li
2011Dynamics in Delegation and Revocation Schemes: A Logical Approach.
Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert W. N. van der Torre
2011Efficient Distributed Linear Programming with Limited Disclosure.
Yuan Hong, Jaideep Vaidya, Haibing Lu
2011Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach.
Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
2011Enhancing CardSpace Authentication Using a Mobile Device.
Haitham S. Al-Sinani, Chris J. Mitchell
2011History-Dependent Inference Control of Queries by Dynamic Policy Adaption.
Joachim Biskup
2011Information Flow Containment: A Practical Basis for Malware Defense.
R. Sekar
2011Integrated Management of Security Policies.
Stefano Paraboschi
2011Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC.
Solomon Berhe, Steven A. Demurjian, Swapna S. Gokhale, Jaime A. Pavlich-Mariscal, Rishi Saripalle
2011Multilevel Secure Data Stream Processing.
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
2011Multiparty Authorization Framework for Data Sharing in Online Social Networks.
Hongxin Hu, Gail-Joon Ahn
2011N-Gram Based Secure Similar Document Detection.
Wei Jiang, Bharath K. Samanthula
2011Preserving Privacy in Structural Neuroimages.
Nakeisha Schimke, Mary Kuehler, John Hale
2011Privacy-Preserving Data Mining: A Game-Theoretic Approach.
Atsuko Miyaji, Mohammad Shahriar Rahman
2011Private Database Search with Sublinear Query Time.
Keith B. Frikken, Boyang Li
2011Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity.
Florian Kerschbaum
2011Query Processing in Private Data Outsourcing Using Anonymization.
Ahmet Erhan Nergiz, Chris Clifton
2011Re-designing the Web's Access Control System - (Extended Abstract).
Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu
2011Selective Disclosure on Encrypted Documents.
Hao Lei, Dengguo Feng
2011Verifiable Secret Sharing with Comprehensive and Efficient Public Verification.
Kun Peng