IFIP TC6 Open Digital Library

27. DBSec 2013: Newark, NJ, USA

Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings

Lingyu Wang, Basit Shafiq

Springer, Lecture Notes in Computer Science 7964, ISBN: 978-3-642-39255-9


Privacy I

Extending Loose Associations to Multiple Fragments.

Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati


Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?

Joachim Biskup, Marcel Preuß


Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring.

Liyue Fan, Li Xiong, Vaidy S. Sunderam


Access Control

Policy Analysis for Administrative Role Based Access Control without Separate Administration.

Ping Yang, Mikhail I. Gofman, Zijiang Yang


Toward Mining of Temporal Roles.

Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya


Towards User-Oriented RBAC Model.

Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar


Cloud Computing

Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations.

Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France


TerraCheck: Verification of Dedicated Cloud Storage.

Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing


Privacy II

Fair Private Set Intersection with a Semi-trusted Arbiter.

Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello


Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection.

Hiroaki Kikuchi, Jun Sakuma


Using Safety Constraint for Transactional Dataset Anonymization.

Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi


Data Outsourcing

Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases.

Attila Altay Yavuz


Optimal Re-encryption Strategy for Joins in Encrypted Databases.

Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert


Access Control and Query Verification for Untrusted Databases.

Rohit Jain, Sunil Prabhakar


Mobile Computing

Quantitative Security Risk Assessment of Android Permissions and Applications.

Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala


A Model for Trust-Based Access Control and Delegation in Mobile Clouds.

Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han


Short Papers

Result Integrity Verification of Outsourced Frequent Itemset Mining.

Boxiang Dong, Ruilin Liu, Wendy Hui Wang


An Approach to Select Cost-Effective Risk Countermeasures.

Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen


Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.

Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere


Rule Enforcement with Third Parties in Secure Cooperative Data Access.

Meixing Le, Krishna Kant, Sushil Jajodia


Unlinkable Content Playbacks in a Multiparty DRM System.

Ronald Petrlic, Stephan Sekula


Analysis of TRBAC with Dynamic Temporal Role Hierarchies.

Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural