DBSec B

25 papers

YearTitle / Authors
2012A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard.
Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet
2012A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC.
Xin Jin, Ram Krishnan, Ravi S. Sandhu
2012A User-to-User Relationship-Based Access Control Model for Online Social Networks.
Yuan Cheng, Jaehong Park, Ravi S. Sandhu
2012Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.
Robert Nix, Murat Kantarcioglu, Keesook J. Han
2012Automated and Efficient Analysis of Role-Based Access Control with Attributes.
Alessandro Armando, Silvio Ranise
2012Code Type Revealing Using Experiments Framework.
Rami Sharon, Ehud Gudes
2012Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings
Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro
2012Decentralized Semantic Threat Graphs.
Simon N. Foley, William M. Fitzgerald
2012Distributed Data Federation without Disclosure of User Existence.
Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga
2012Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga
2012From MDM to DB2: A Case Study of Security Enforcement Migration.
Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run
2012Improving Virtualization Security by Splitting Hypervisor into Smaller Components.
Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing
2012Layered Security Architecture for Masquerade Attack Detection.
Hamed Saljooghinejad, Wilson Naik Bhukya
2012Logics for Security and Privacy.
Leendert W. N. van der Torre
2012Privacy Consensus in Anonymization Systems via Game Theory.
Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini
2012Privacy-Preserving Subgraph Discovery.
Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri
2012Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.
Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham
2012Reconstruction Attack through Classifier Analysis.
Sébastien Gambs, Ahmed Gmati, Michel Hurfin
2012Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.
Ding Wang, Chunguang Ma, Peng Wu
2012Security Limitations of Using Secret Sharing for Data Outsourcing.
Jonathan L. Dautrich Jr., Chinya V. Ravishankar
2012Security Vulnerabilities of User Authentication Scheme Using Smart Card.
Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi
2012Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies.
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann
2012Uniform Obfuscation for Location Privacy.
Gianluca Dini, Pericle Perazzo
2012XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks.
Smitha Sundareswaran, Anna Cinzia Squicciarini
2012k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.
Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili