IFIP TC6 Open Digital Library

25. DBSec 2011: Richmond, VA, USA

Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings

Yingjiu Li

Springer, Lecture Notes in Computer Science 6818, ISBN: 978-3-642-22347-1


Invited Papers

Information Flow Containment: A Practical Basis for Malware Defense.

R. Sekar


Re-designing the Web's Access Control System - (Extended Abstract).

Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu


Integrated Management of Security Policies.

Stefano Paraboschi


Access Control I

Cooperative Data Access in Multi-cloud Environments.

Meixing Le, Krishna Kant, Sushil Jajodia


Multiparty Authorization Framework for Data Sharing in Online Social Networks.

Hongxin Hu, Gail-Joon Ahn


Privacy-Preserving Data Applications I

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach.

Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati


Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity.

Florian Kerschbaum


Access Control II

An Optimization Model for the Extended Role Mining Problem.

Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya


Dynamics in Delegation and Revocation Schemes: A Logical Approach.

Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert van der Torre


Data Confidentiality and Query Verification

History-Dependent Inference Control of Queries by Dynamic Policy Adaption.

Joachim Biskup


Multilevel Secure Data Stream Processing.

Raman Adaikkalavan, Indrakshi Ray, Xing Xie


Query and Data Privacy

Query Processing in Private Data Outsourcing Using Anonymization.

Ahmet Erhan Nergiz, Chris Clifton


Private Database Search with Sublinear Query Time.

Keith B. Frikken, Boyang Li


Privacy-Preserving Data Applications II

Efficient Distributed Linear Programming with Limited Disclosure.

Yuan Hong, Jaideep Vaidya, Haibing Lu


Privacy-Preserving Data Mining: A Game-Theoretic Approach.

Atsuko Miyaji, Mohammad Shahriar Rahman


Authentication and Secret Sharing

Enhancing CardSpace Authentication Using a Mobile Device.

Haitham S. Al-Sinani, Chris J. Mitchell


Verifiable Secret Sharing with Comprehensive and Efficient Public Verification.

Kun Peng


Short Papers

A Robust Remote User Authentication Scheme against Smart Card Security Breach.

Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee


N-Gram Based Secure Similar Document Detection.

Wei Jiang, Bharath K. Samanthula


An Index Structure for Private Data Outsourcing.

Aaron Steele, Keith B. Frikken


Selective Disclosure on Encrypted Documents.

Hao Lei, Dengguo Feng


A New Leakage-Resilient IBE Scheme in the Relative Leakage Model.

Yu Chen, Song Luo, Zhong Chen


Accurate Accident Reconstruction in VANET.

Yuliya Kopylova, Csilla Farkas, Wenyuan Xu


Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning.

Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez


Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC.

Solomon Berhe, Steven A. Demurjian, Swapna S. Gokhale, Jaime A. Pavlich-Mariscal, Rishi Saripalle


Preserving Privacy in Structural Neuroimages.

Nakeisha Schimke, Mary Kuehler, John Hale