Description |
1 online resource (xiii, 329 pages) : illustrations |
Series |
Lecture notes in computer science, 1611-3349 ; 7371 |
|
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI |
|
Lecture notes in computer science ; 7371. 1611-3349
|
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
|
Contents |
Logics for Security and Privacy / Leendert van der Torre -- A User-to-User Relationship-Based Access Control Model for Online Social Networks / Yuan Cheng, Jaehong Park and Ravi Sandhu -- Automated and Efficient Analysis of Role-Based Access Control with Attributes / Alessandro Armando and Silvio Ranise -- A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC / Xin Jin, Ram Krishnan and Ravi Sandhu -- Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies / Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner and Torsten Schlotmann -- Privacy Consensus in Anonymization Systems via Game Theory / Rosa Karimi Adl, Mina Askari, Ken Barker and Reihaneh Safavi-Naini -- Uniform Obfuscation for Location Privacy / Gianluca Dini and Pericle Perazzo -- Security Vulnerabilities of User Authentication Scheme Using Smart Card / Ravi Singh Pippal, Jaidhar C.D. and Shashikala Tapaswi -- Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards / Ding Wang, Chun-guang Ma and Peng Wu -- A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard / Tiana Razafindralambo, Guillaume Bouffard and Jean-Louis Lanet -- Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data / Robert Nix, Murat Kantarcioglu and Keesook J. Han -- Security Limitations of Using Secret Sharing for Data Outsourcing / Jonathan L. Dautrich and Chinya V. Ravishankar -- Privacy-Preserving Subgraph Discovery / Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong and Nabil Adam, et al. -- Decentralized Semantic Threat Graphs / Simon N. Foley and William M. Fitzgerald -- Code Type Revealing Using Experiments Framework / Rami Sharon and Ehud Gudes -- From MDM to DB2: A Case Study of Security Enforcement Migration / Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood and Paul van Run -- XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks / Smitha Sundareswaran and Anna Cinzia Squicciarini -- Randomizing Smartphone Malware Profiles against Statistical Mining Techniques / Abhijith Shastry, Murat Kantarcioglu, Yan Zhou and Bhavani Thuraisingham -- Layered Security Architecture for Masquerade Attack Detection / Hamed Saljooghinejad and Wilson Naik Bhukya -- k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing / Abbas Taheri Soodejani, Mohammad Ali Hadavi and Rasool Jalili -- Reconstruction Attack through Classifier Analysis / Sébastien Gambs, Ahmed Gmati and Michel Hurfin -- Distributed Data Federation without Disclosure of User Existence / Takao Takenouchi, Takahiro Kawamura and Akihiko Ohsuga -- Improving Virtualization Security by Splitting Hypervisor into Smaller Components / Wuqiong Pan, Yulong Zhang, Meng Yu and Jiwu Jing -- Enforcing Subscription-Based Authorization Policies in Cloud Scenarios / Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia and Giovanni Livraga |
Summary |
This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Information Systems |
|
Systems and Data Security |
|
Management of Computing and Information Systems |
|
Information Systems Applications (incl. Internet) |
|
Data Mining and Knowledge Discovery |
|
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
internet |
|
gegevensbeheer |
|
data management |
|
datamining |
|
data mining |
|
computernetwerken |
|
computer networks |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed August 13, 2012) |
Subject |
Computer security -- Congresses
|
|
Internet -- Security measures -- Congresses
|
|
Data protection -- Congresses
|
|
Database security -- Congresses
|
|
Informatique.
|
|
Computer security
|
|
Data protection
|
|
Database security
|
|
Internet -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Cuppens-Boulahia, Nora
|
|
Cuppens, Frédéric.
|
|
Garcia-Alfaro, Joaquin.
|
ISBN |
9783642315404 |
|
3642315402 |
|
3642315399 |
|
9783642315398 |
|