DBSec B

23 papers

YearTitle / Authors
2013A Model for Trust-Based Access Control and Delegation in Mobile Clouds.
Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han
2013Access Control and Query Verification for Untrusted Databases.
Rohit Jain, Sunil Prabhakar
2013An Approach to Select Cost-Effective Risk Countermeasures.
Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen
2013Analysis of TRBAC with Dynamic Temporal Role Hierarchies.
Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
2013Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection.
Hiroaki Kikuchi, Jun Sakuma
2013Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings
Lingyu Wang, Basit Shafiq
2013Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?
Joachim Biskup, Marcel Preuß
2013Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring.
Liyue Fan, Li Xiong, Vaidy S. Sunderam
2013Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.
Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere
2013Extending Loose Associations to Multiple Fragments.
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
2013Fair Private Set Intersection with a Semi-trusted Arbiter.
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
2013Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations.
Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France
2013Optimal Re-encryption Strategy for Joins in Encrypted Databases.
Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert
2013Policy Analysis for Administrative Role Based Access Control without Separate Administration.
Ping Yang, Mikhail I. Gofman, Zijiang Yang
2013Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases.
Attila Altay Yavuz
2013Quantitative Security Risk Assessment of Android Permissions and Applications.
Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala
2013Result Integrity Verification of Outsourced Frequent Itemset Mining.
Boxiang Dong, Ruilin Liu, Wendy Hui Wang
2013Rule Enforcement with Third Parties in Secure Cooperative Data Access.
Meixing Le, Krishna Kant, Sushil Jajodia
2013TerraCheck: Verification of Dedicated Cloud Storage.
Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing
2013Toward Mining of Temporal Roles.
Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
2013Towards User-Oriented RBAC Model.
Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar
2013Unlinkable Content Playbacks in a Multiparty DRM System.
Ronald Petrlic, Stephan Sekula
2013Using Safety Constraint for Transactional Dataset Anonymization.
Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi