Skip to main content

Über dieses Buch

This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.



Privacy I

2013 | OriginalPaper | Buchkapitel

Extending Loose Associations to Multiple Fragments

Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati

2013 | OriginalPaper | Buchkapitel

Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?

Joachim Biskup, Marcel Preuß

2013 | OriginalPaper | Buchkapitel

Differentially Private Multi-dimensional Time Series Release for Traffic Monitoring

Liyue Fan, Li Xiong, Vaidy Sunderam

Access Control

2013 | OriginalPaper | Buchkapitel

Policy Analysis for Administrative Role Based Access Control without Separate Administration

Ping Yang, Mikhail Gofman, Zijiang Yang

2013 | OriginalPaper | Buchkapitel

Toward Mining of Temporal Roles

Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya

2013 | OriginalPaper | Buchkapitel

Towards User-Oriented RBAC Model

Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar

Cloud Computing

2013 | OriginalPaper | Buchkapitel

Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations

Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France

2013 | OriginalPaper | Buchkapitel

TerraCheck: Verification of Dedicated Cloud Storage

Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing

Privacy II

2013 | OriginalPaper | Buchkapitel

Fair Private Set Intersection with a Semi-trusted Arbiter

Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello

2013 | OriginalPaper | Buchkapitel

Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection

Hiroaki Kikuchi, Jun Sakuma

2013 | OriginalPaper | Buchkapitel

Using Safety Constraint for Transactional Dataset Anonymization

Bechara Al Bouna, Chris Clifton, Qutaibah Malluhi

Data Outsourcing

2013 | OriginalPaper | Buchkapitel

Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases

Attila A. Yavuz

2013 | OriginalPaper | Buchkapitel

Optimal Re-encryption Strategy for Joins in Encrypted Databases

Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert

2013 | OriginalPaper | Buchkapitel

Access Control and Query Verification for Untrusted Databases

Rohit Jain, Sunil Prabhakar

Mobile Computing

2013 | OriginalPaper | Buchkapitel

Quantitative Security Risk Assessment of Android Permissions and Applications

Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala

2013 | OriginalPaper | Buchkapitel

A Model for Trust-Based Access Control and Delegation in Mobile Clouds

Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han

Short Papers

2013 | OriginalPaper | Buchkapitel

Result Integrity Verification of Outsourced Frequent Itemset Mining

Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang

2013 | OriginalPaper | Buchkapitel

An Approach to Select Cost-Effective Risk Countermeasures

Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen

2013 | OriginalPaper | Buchkapitel

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase

Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere

2013 | OriginalPaper | Buchkapitel

Rule Enforcement with Third Parties in Secure Cooperative Data Access

Meixing Le, Krishna Kant, Sushil Jajodia

2013 | OriginalPaper | Buchkapitel

Unlinkable Content Playbacks in a Multiparty DRM System

Ronald Petrlic, Stephan Sekula

2013 | OriginalPaper | Buchkapitel

Analysis of TRBAC with Dynamic Temporal Role Hierarchies

Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural


Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.



Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!