IFIP TC6 Open Digital Library

26. DBSec 2012: Paris, France

Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings

Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro

Springer, Lecture Notes in Computer Science 7371, ISBN: 978-3-642-31539-8


Invited Paper

Logics for Security and Privacy.

Leendert van der Torre


Access Control

A User-to-User Relationship-Based Access Control Model for Online Social Networks.

Yuan Cheng, Jaehong Park, Ravi S. Sandhu


Automated and Efficient Analysis of Role-Based Access Control with Attributes.

Alessandro Armando, Silvio Ranise


A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC.

Xin Jin, Ram Krishnan, Ravi S. Sandhu


Confidentiality and Privacy

Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies.

Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann


Privacy Consensus in Anonymization Systems via Game Theory.

Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini


Uniform Obfuscation for Location Privacy.

Gianluca Dini, Pericle Perazzo


Smart Cards Security (Short Papers)

Security Vulnerabilities of User Authentication Scheme Using Smart Card.

Ravi Singh Pippal, Jaidhar C. D., Shashikala Tapaswi


Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.

Ding Wang, Chunguang Ma, Peng Wu


A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard.

Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet


Privacy-Preserving Technologies

Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.

Robert Nix, Murat Kantarcioglu, Keesook J. Han


Security Limitations of Using Secret Sharing for Data Outsourcing.

Jonathan L. Dautrich Jr., Chinya V. Ravishankar


Privacy-Preserving Subgraph Discovery.

Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri


Data Management

Decentralized Semantic Threat Graphs.

Simon N. Foley, William M. Fitzgerald


Code Type Revealing Using Experiments Framework.

Rami Sharon, Ehud Gudes


From MDM to DB2: A Case Study of Security Enforcement Migration.

Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run


Intrusion and Malware

XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks.

Smitha Sundareswaran, Anna Cinzia Squicciarini


Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.

Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani M. Thuraisingham


Probabilistic Attacks and Protection (Short Papers)

Layered Security Architecture for Masquerade Attack Detection.

Hamed Saljooghinejad, Wilson Naik Bhukya


k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.

Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili


Reconstruction Attack through Classifier Analysis.

Sébastien Gambs, Ahmed Gmati, Michel Hurfin


Cloud Computing

Distributed Data Federation without Disclosure of User Existence.

Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga


Improving Virtualization Security by Splitting Hypervisor into Smaller Components.

Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing


Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.

Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga