Limit search to available items
Book Cover
E-book
Author Annual IFIP WG 11.3 Working Conference on Data and Applications Security (26th : 2012 : Paris, France)

Title Data and applications security and privacy XXVI : 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings / Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource (xiii, 329 pages) : illustrations
Series Lecture notes in computer science, 1611-3349 ; 7371
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI
Lecture notes in computer science ; 7371. 1611-3349
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Contents Logics for Security and Privacy / Leendert van der Torre -- A User-to-User Relationship-Based Access Control Model for Online Social Networks / Yuan Cheng, Jaehong Park and Ravi Sandhu -- Automated and Efficient Analysis of Role-Based Access Control with Attributes / Alessandro Armando and Silvio Ranise -- A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC / Xin Jin, Ram Krishnan and Ravi Sandhu -- Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies / Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner and Torsten Schlotmann -- Privacy Consensus in Anonymization Systems via Game Theory / Rosa Karimi Adl, Mina Askari, Ken Barker and Reihaneh Safavi-Naini -- Uniform Obfuscation for Location Privacy / Gianluca Dini and Pericle Perazzo -- Security Vulnerabilities of User Authentication Scheme Using Smart Card / Ravi Singh Pippal, Jaidhar C.D. and Shashikala Tapaswi -- Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards / Ding Wang, Chun-guang Ma and Peng Wu -- A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard / Tiana Razafindralambo, Guillaume Bouffard and Jean-Louis Lanet -- Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data / Robert Nix, Murat Kantarcioglu and Keesook J. Han -- Security Limitations of Using Secret Sharing for Data Outsourcing / Jonathan L. Dautrich and Chinya V. Ravishankar -- Privacy-Preserving Subgraph Discovery / Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong and Nabil Adam, et al. -- Decentralized Semantic Threat Graphs / Simon N. Foley and William M. Fitzgerald -- Code Type Revealing Using Experiments Framework / Rami Sharon and Ehud Gudes -- From MDM to DB2: A Case Study of Security Enforcement Migration / Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood and Paul van Run -- XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks / Smitha Sundareswaran and Anna Cinzia Squicciarini -- Randomizing Smartphone Malware Profiles against Statistical Mining Techniques / Abhijith Shastry, Murat Kantarcioglu, Yan Zhou and Bhavani Thuraisingham -- Layered Security Architecture for Masquerade Attack Detection / Hamed Saljooghinejad and Wilson Naik Bhukya -- k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing / Abbas Taheri Soodejani, Mohammad Ali Hadavi and Rasool Jalili -- Reconstruction Attack through Classifier Analysis / Sébastien Gambs, Ahmed Gmati and Michel Hurfin -- Distributed Data Federation without Disclosure of User Existence / Takao Takenouchi, Takahiro Kawamura and Akihiko Ohsuga -- Improving Virtualization Security by Splitting Hypervisor into Smaller Components / Wuqiong Pan, Yulong Zhang, Meng Yu and Jiwu Jing -- Enforcing Subscription-Based Authorization Policies in Cloud Scenarios / Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia and Giovanni Livraga
Summary This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
computerwetenschappen
computer sciences
informatiesystemen
internet
gegevensbeheer
data management
datamining
data mining
computernetwerken
computer networks
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed August 13, 2012)
Subject Computer security -- Congresses
Internet -- Security measures -- Congresses
Data protection -- Congresses
Database security -- Congresses
Informatique.
Computer security
Data protection
Database security
Internet -- Security measures
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Cuppens-Boulahia, Nora
Cuppens, Frédéric.
Garcia-Alfaro, Joaquin.
ISBN 9783642315404
3642315402
3642315399
9783642315398
Other Titles DBSec 2012
Data and applications security and privacy 26