IFIP TC6 Open Digital Library

24. DBSec 2010: Rome, Italy

Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

Sara Foresti, Sushil Jajodia

Springer, Lecture Notes in Computer Science 6166, ISBN: 978-3-642-13738-9


Query and Data Privacy

Generalizing PIR for Practical Private Retrieval of Public Data.

Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi


A Logic of Privacy.

Steve Barker, Valerio Genovese


Understanding Privacy Risk of Publishing Decision Trees.

Zutao Zhu, Wenliang Du


Data Protection

Secure Outsourcing of DNA Searching via Finite Automata.

Marina Blanton, Mehrdad Aliasgari


A Labelling System for Derived Data Control.

Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu


On the Identification of Property Based Generalizations in Microdata Anonymization.

Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley


Access Control

Role Mining in the Presence of Noise.

Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu


Distributed and Secure Access Control in P2P Databases.

Angela Bonifati, Ruilin Liu, Wendy Hui Wang


Constructing Key Assignment Schemes from Chain Partitions.

Jason Crampton, Rosli Daud, Keith M. Martin


Data Confidentiality and Query Veri?cation

fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality.

Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci


Efficient Inference Control for Open Relational Queries.

Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner


Query Racing: Fast Completeness Certification of Query Results.

Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco


Policy Definition and Enforcement

Mining Likely Properties of Access Control Policies via Association Rule Mining.

JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay


Scalable and Efficient Reasoning for Enforcing Role-Based Access Control.

Tyrone Cadenhead, Murat Kantarcioglu, Bhavani M. Thuraisingham


Enforcing Request Integrity in Web Applications.

Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin


Trust and Identity Management

Using Trust-Based Information Aggregation for Predicting Security Level of Systems.

Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray


Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms.

Aarthi Nagarajan, Vijay Varadharajan


Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms.

Jan Zibuschka, Matthias Herbert, Heiko Rossnagel


Short Papers

An Access Control Model for Web Databases.

Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene-Ayachi


Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems.

Hasan Qunoo, Mark Ryan


Evaluating the Risk of Adopting RBAC Roles.

Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde


Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance.

Amril Syalim, Takashi Nishide, Kouichi Sakurai


When ABE Meets RSS.

Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen


PriMan : A Privacy-Preserving Identity Framework.

Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker


Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach.

Alex Hai Wang


Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach.

Ramaswamy Chandramouli


A Secure RFID Ticket System for Public Transport.

Kun Peng, Feng Bao


Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols.

Suratose Tritilanunt


Secure Location Verification - A Security Analysis of GPS Signal Authentication.

Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar