index - LNCS 8566: Data and Applications Security and Privacy XXVIII Access content directly
   

Full Text Documents

Chargement de la page

Search

Chargement de la page
Table of Contents

Data and Applications Security and Privacy XXVIII
Vijay Atluri, Günther Pernul (Eds.)
 Front Matter
Integrity Assurance for Outsourced Databases without DBMS Modification
Wei Wei, Ting Yu
1-16
Specification and Deployment of Integrated Security Policies for Outsourced Data
Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard
17 - 32
Optimizing Integrity Checks for Join Queries in the Cloud
Sabrina Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
33-48
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials
David Derler, Christian Hanser, Daniel Slamanig
49-65
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds
Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray
66 - 81
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud
Samira Barouti, Feras Aljumah, Dima Alhadidi, Mourad Debbabi
82-97
Data Leakage Quantification
Sokratis Vavilis, Milan Petković, Nicola Zannone
98-113
Toward Software Diversity in Heterogeneous Networked Systems
Chu Huang, Sencun Zhu, Robert Erbacher
114-129
FSquaDRA: Fast Detection of Repackaged Applications
Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina, Ermanno Moser
130-145
Who, When, and Where? Location Proof Assertion for Mobile Devices
Rasib Khan, Shams Zawoad, Md Haque, Ragib Hasan
146-162
Design Patterns for Multiple Stakeholders in Social Computing
Pooya Mehregan, Philip Fong
163-178
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure
Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang
179-194
ELITE: zEro Links Identity managemenT systEm
Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray
195 - 210
Dynamic Workflow Adjustment with Security Constraints
Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang, Lian Duan
211-226
Consistent Query Plan Generation in Secure Cooperative Data Access
Meixing Le, Krishna Kant, Sushil Jajodia
227-242
Hunting the Unknown
Elisa Costante, Jerry Hartog, Milan Petković, Sandro Etalle, Mykola Pechenizkiy
243-259
Incremental Analysis of Evolving Administrative Role Based Access Control Policies
Silvio Ranise, Anh Truong
260-275
Mining Attribute-Based Access Control Policies from Logs
Zhongyuan Xu, Scott Stoller
276-291
Attribute-Aware Relationship-Based Access Control for Online Social Networks
Yuan Cheng, Jaehong Park, Ravi Sandhu
292-306
Randomly Partitioned Encryption for Cloud Databases
Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, Ramarathnam Venkatesan
307-323
Towards Secure Cloud Database with Fine-Grained Access Control
Michael Solomon, Vaidy Sunderam, Li Xiong
324-338
Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database
Giovanni Crescenzo, Debra Cook, Allen Mcintosh, Euthimios Panagos
339-355
LPM: Layered Policy Management for Software-Defined Networks
Wonkyu Han, Hongxin Hu, Gail-Joon Ahn
356-363
On Minimizing the Size of Encrypted Databases
Giovanni Crescenzo, David Shallcross
364-372
Efficient and Enhanced Solutions for Content Sharing in DRM Systems
Michal Davidson, Ehud Gudes, Tamir Tassa
373-381
A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters
Vikas Ashok, Ravi Mukkamala
382-389
 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/