DBSec B

25 papers

YearTitle / Authors
2015A Topology Based Flow Model for Computing Domain Reputation.
Igor Mishsky, Nurit Gal-Oz, Ehud Gudes
2015An Administrative Model for Relationship-Based Access Control.
Scott D. Stoller
2015Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios.
Daniel Ricardo dos Santos, Silvio Ranise, Luca Compagna, Serena Elisa Ponta
2015Automated Translation of End User Policies for Usage Control Enforcement.
Prachi Kumari, Alexander Pretschner
2015Constructing Inference-Proof Belief Mediators.
Joachim Biskup, Cornelia Tadros
2015Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings
Pierangela Samarati
2015Defensive Resource Allocations with Security Chokepoints in IPv6 Networks.
Assane Gueye, Peter Mell, Richard E. Harang, Richard J. La
2015Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis.
Euijin Choo, Ting Yu, Min Chi
2015Expiration and Revocation of Keys for Attribute-Based Signatures.
Stephen R. Tate, Roopa Vishwanathan
2015FPGuard: Detection and Prevention of Browser Fingerprinting.
Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam
2015FamilyID: A Hybrid Approach to Identify Family Information from Microblogs.
Jamuna Gopal, Shu Huang, Bo Luo
2015Inference Leakage Detection for Authorization Policies over RDF Data.
Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid
2015Integrating Attributes into Role-Based Access Control.
Qasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan
2015MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce.
Neelam Memon, Jianhua Shao
2015Migrating from DAC to RBAC.
Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
2015Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies.
Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones
2015Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid.
Hu Chun, Kui Ren, Wei Jiang
2015Personalized Composition of Trustful Reputation Systems.
Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul
2015Privacy Preserving Record Matching Using Automated Semi-trusted Broker.
Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia
2015Privacy-Preserving Public Transport Ticketing System.
Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker
2015Privacy-Preserving Range Queries from Keyword Queries.
Giovanni Di Crescenzo, Abhrajit Ghosh
2015Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System.
Annanda Thavymony Rath, Jean-Noël Colin
2015Sanitization of Call Detail Records via Differentially-Private Bloom Filters.
Mohammad Alaggan, Sébastien Gambs, Stan Matwin, Mohammed Tuhin
2015Stream Processing with Secure Information Flow Constraints.
Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose F. Gamble
2015Towards Collaborative Query Planning in Multi-party Database Networks.
Mingyi Zhao, Peng Liu, Jorge Lobo