default search action
28. DBSec 2014: Vienna, Austria
- Vijay Atluri, Günther Pernul:
Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture Notes in Computer Science 8566, Springer 2014, ISBN 978-3-662-43935-7 - Wei Wei, Ting Yu:
Integrity Assurance for Outsourced Databases without DBMS Modification. 1-16 - Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Specification and Deployment of Integrated Security Policies for Outsourced Data. 17-32 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Optimizing Integrity Checks for Join Queries in the Cloud. 33-48 - David Derler, Christian Hanser, Daniel Slamanig:
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials. 49-65 - Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray:
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. 66-81 - Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi:
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud. 82-97 - Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
Data Leakage Quantification. 98-113 - Chu Huang, Sencun Zhu, Robert F. Erbacher:
Toward Software Diversity in Heterogeneous Networked Systems. 114-129 - Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser:
FSquaDRA: Fast Detection of Repackaged Applications. 130-145 - Rasib Khan, Shams Zawoad, Md Munirul Haque, Ragib Hasan:
'Who, When, and Where?' Location Proof Assertion for Mobile Devices. 146-162 - Pooya Mehregan, Philip W. L. Fong:
Design Patterns for Multiple Stakeholders in Social Computing. 163-178 - Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang:
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. 179-194 - Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray:
ELITE: zEro Links Identity managemenT systEm. 195-210 - Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, Lian Duan:
Dynamic Workflow Adjustment with Security Constraints. 211-226 - Meixing Le, Krishna Kant, Sushil Jajodia:
Consistent Query Plan Generation in Secure Cooperative Data Access. 227-242 - Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy:
Hunting the Unknown - White-Box Database Leakage Detection. 243-259 - Silvio Ranise, Anh Tuan Truong:
Incremental Analysis of Evolving Administrative Role Based Access Control Policies. 260-275 - Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-Based Access Control Policies from Logs. 276-291 - Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Attribute-Aware Relationship-Based Access Control for Online Social Networks. 292-306 - Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, Ramarathnam Venkatesan:
Randomly Partitioned Encryption for Cloud Databases. 307-323 - Michael G. Solomon, Vaidy S. Sunderam, Li Xiong:
Towards Secure Cloud Database with Fine-Grained Access Control. 324-338 - Giovanni Di Crescenzo, Debra L. Cook, Allen McIntosh, Euthimios Panagos:
Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database. 339-355 - Wonkyu Han, Hongxin Hu, Gail-Joon Ahn:
LPM: Layered Policy Management for Software-Defined Networks. 356-363 - Giovanni Di Crescenzo, David Shallcross:
On Minimizing the Size of Encrypted Databases. 364-372 - Michal Davidson, Ehud Gudes, Tamir Tassa:
Efficient and Enhanced Solutions for Content Sharing in DRM Systems. 373-381 - Vikas G. Ashok, Ravi Mukkamala:
A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters. 382-389
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.