Full Text Documents

24

Search


Table of Contents
Data and Applications Security and Privacy XXIX
Pierangela Samarati
Front Matter

Data Anonymization and Computation


MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce
Neelam Memon, Jianhua Shao
3-18
Towards Collaborative Query Planning in Multi-party Database Networks
Mingyi Zhao, Peng Liu, Jorge Lobo
19-34
Privacy-Preserving Range Queries from Keyword Queries
Giovanni Crescenzo, Abhrajit Ghosh
35-50

Access Control and Authorization


An Administrative Model for Relationship-Based Access Control
Scott Stoller
53-68
Migrating from DAC to RBAC
Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
69-84
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios
Daniel Santos, Silvio Ranise, Luca Compagna, Serena Ponta
85-100

User Privacy


Privacy Preserving Record Matching Using Automated Semi-trusted Broker
Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael Kahn, Frederic Cuppens, Nora Cuppens
103-118
Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid
Hu Chun, Kui Ren, Wei Jiang
119-134
Privacy-Preserving Public Transport Ticketing System
Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart Decker
135-150

Authentication and Information Integration


Expiration and Revocation of Keys for Attribute-Based Signatures
Stephen Tate, Roopa Vishwanathan
153-169
Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis
Euijin Choo, Ting Yu, Min Chi
170-187
Constructing Inference-Proof Belief Mediators
Joachim Biskup, Cornelia Tadros
188-203

Privacy and Trust


Personalized Composition of Trustful Reputation Systems
Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul
207-214
FamilyID: A Hybrid Approach to Identify Family Information from Microblogs
Jamuna Gopal, Shu Huang, Bo Luo
215-222
Sanitization of Call Detail Records via Differentially-Private Bloom Filters
Mohammad Alaggan, Sébastien Gambs, Stan Matwin, Mohammed Tuhin
223-230

Access Control and Usage Policies


Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System
Annanda Rath, Jean-Noël Colin
233-241
Integrating Attributes into Role-Based Access Control
Qasim Rajpoot, Christian Jensen, Ram Krishnan
242-249
Automated Translation of End User Policies for Usage Control Enforcement
Prachi Kumari, Alexander Pretschner
250-258

Network and Internet Security


Defensive Resource Allocations with Security Chokepoints in IPv6 Networks
Assane Gueye, Peter Mell, Richard Harang, Richard La
261-276
A Topology Based Flow Model for Computing Domain Reputation
Igor Mishsky, Nurit Gal-Oz, Ehud Gudes
277-292
FPGuard: Detection and Prevention of Browser Fingerprinting
Amin Faizkhademi, Mohammad Zulkernine, Komminist Weldemariam
293-308

Information Flow and Inference


Stream Processing with Secure Information Flow Constraints
Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose Gamble
311-329
Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies
Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones
330-345
Inference Leakage Detection for Authorization Policies over RDF Data
Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid
346-361

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/