DBSec B

27 papers

YearTitle / Authors
2014'Who, When, and Where?' Location Proof Assertion for Mobile Devices.
Rasib Khan, Shams Zawoad, Md Munirul Haque, Ragib Hasan
2014A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters.
Vikas G. Ashok, Ravi Mukkamala
2014Attribute-Aware Relationship-Based Access Control for Online Social Networks.
Yuan Cheng, Jaehong Park, Ravi S. Sandhu
2014Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang
2014Consistent Query Plan Generation in Secure Cooperative Data Access.
Meixing Le, Krishna Kant, Sushil Jajodia
2014Data Leakage Quantification.
Sokratis Vavilis, Milan Petkovic, Nicola Zannone
2014Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings
Vijay Atluri, Günther Pernul
2014Design Patterns for Multiple Stakeholders in Social Computing.
Pooya Mehregan, Philip W. L. Fong
2014Dynamic Workflow Adjustment with Security Constraints.
Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, Lian Duan
2014ELITE: zEro Links Identity managemenT systEm.
Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray
2014Efficient and Enhanced Solutions for Content Sharing in DRM Systems.
Michal Davidson, Ehud Gudes, Tamir Tassa
2014FSquaDRA: Fast Detection of Repackaged Applications.
Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser
2014Hunting the Unknown - White-Box Database Leakage Detection.
Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy
2014Incremental Analysis of Evolving Administrative Role Based Access Control Policies.
Silvio Ranise, Anh Tuan Truong
2014Integrity Assurance for Outsourced Databases without DBMS Modification.
Wei Wei, Ting Yu
2014LPM: Layered Policy Management for Software-Defined Networks.
Wonkyu Han, Hongxin Hu, Gail-Joon Ahn
2014Mining Attribute-Based Access Control Policies from Logs.
Zhongyuan Xu, Scott D. Stoller
2014On Minimizing the Size of Encrypted Databases.
Giovanni Di Crescenzo, David Shallcross
2014Optimizing Integrity Checks for Join Queries in the Cloud.
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
2014Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database.
Giovanni Di Crescenzo, Debra L. Cook, Allen McIntosh, Euthimios Panagos
2014Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials.
David Derler, Christian Hanser, Daniel Slamanig
2014Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.
Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray
2014Randomly Partitioned Encryption for Cloud Databases.
Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, Ramarathnam Venkatesan
2014Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud.
Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi
2014Specification and Deployment of Integrated Security Policies for Outsourced Data.
Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard
2014Toward Software Diversity in Heterogeneous Networked Systems.
Chu Huang, Sencun Zhu, Robert F. Erbacher
2014Towards Secure Cloud Database with Fine-Grained Access Control.
Michael G. Solomon, Vaidy S. Sunderam, Li Xiong