index - Data and Applications Security and Privacy XXIX Access content directly
   


Full Text Documents

24

Search


Table of Contents
Data and Applications Security and Privacy XXIX
Pierangela Samarati
Front Matter

Data Anonymization and Computation


MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce
Neelam Memon, Jianhua Shao
3-18
Towards Collaborative Query Planning in Multi-party Database Networks
Mingyi Zhao, Peng Liu, Jorge Lobo
19-34
Privacy-Preserving Range Queries from Keyword Queries
Giovanni Crescenzo, Abhrajit Ghosh
35-50

Access Control and Authorization


An Administrative Model for Relationship-Based Access Control
Scott Stoller
53-68
Migrating from DAC to RBAC
Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
69-84
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios
Daniel Santos, Silvio Ranise, Luca Compagna, Serena Ponta
85-100

User Privacy


Privacy Preserving Record Matching Using Automated Semi-trusted Broker
Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael Kahn, Frederic Cuppens, Nora Cuppens
103-118
Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid
Hu Chun, Kui Ren, Wei Jiang
119-134
Privacy-Preserving Public Transport Ticketing System
Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart Decker
135-150

Authentication and Information Integration


Expiration and Revocation of Keys for Attribute-Based Signatures
Stephen Tate, Roopa Vishwanathan
153-169
Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis
Euijin Choo, Ting Yu, Min Chi
170-187
Constructing Inference-Proof Belief Mediators
Joachim Biskup, Cornelia Tadros
188-203

Privacy and Trust


Personalized Composition of Trustful Reputation Systems
Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul
207-214
FamilyID: A Hybrid Approach to Identify Family Information from Microblogs
Jamuna Gopal, Shu Huang, Bo Luo
215-222
Sanitization of Call Detail Records via Differentially-Private Bloom Filters
Mohammad Alaggan, Sébastien Gambs, Stan Matwin, Mohammed Tuhin
223-230

Access Control and Usage Policies


Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System
Annanda Rath, Jean-Noël Colin
233-241
Integrating Attributes into Role-Based Access Control
Qasim Rajpoot, Christian Jensen, Ram Krishnan
242-249
Automated Translation of End User Policies for Usage Control Enforcement
Prachi Kumari, Alexander Pretschner
250-258

Network and Internet Security


Defensive Resource Allocations with Security Chokepoints in IPv6 Networks
Assane Gueye, Peter Mell, Richard Harang, Richard La
261-276
A Topology Based Flow Model for Computing Domain Reputation
Igor Mishsky, Nurit Gal-Oz, Ehud Gudes
277-292
FPGuard: Detection and Prevention of Browser Fingerprinting
Amin Faizkhademi, Mohammad Zulkernine, Komminist Weldemariam
293-308

Information Flow and Inference


Stream Processing with Secure Information Flow Constraints
Indrakshi Ray, Raman Adaikkalavan, Xing Xie, Rose Gamble
311-329
Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies
Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones
330-345
Inference Leakage Detection for Authorization Policies over RDF Data
Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid
346-361

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/