Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings

Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings


Eligible for FREE SHIPPING
  • Want it by Thursday, October 18?   Order by 12:00 PM Eastern and choose Expedited Shipping at checkout.


Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings by Sara Foresti

This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010.
The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management.

Product Details

ISBN-13: 9783642137389
Publisher: Springer Berlin Heidelberg
Publication date: 08/11/2010
Series: Lecture Notes in Computer Science , #6166
Edition description: 2010
Pages: 376
Product dimensions: 6.20(w) x 9.20(h) x 0.80(d)

Table of Contents

Query and Data Privacy

Generalizing PIR for Practical Private Retrieval of Public Data Shiyuan Wang Divyakant Agrawal Amr El Abbadi 1

A Logic of Privacy Steve Barker Valerio Genovese 17

Understanding Privacy Risk of Publishing Decision Trees Zutao Zhu Wenliang Du 33

Data Protection

Secure Outsourcing of DNA Searching via Finite Automata Marina Blanton Mehrdad Aliasgari 49

A Labelling System for Derived Data Control Enrico Scalavino Vaibhav Gowadia Emil C. Lupu 65

On the Identification of Property Based Generalizations in Microdata Anonymization Rinku Dewri Indrajit Ray Indrakshi Ray Darrell Whitley 81

Access Control

Role Mining in the Presence of Noise Jaideep Vaidya Vijayalakshmi Atluri Qi Guo Haibing Lu 97

Distributed and Secure Access Control in P2P Databases Angela Bonifati Ruilin Liu Hui (Wendy) Wang 113

Constructing Key Assignment Schemes from Chain Partitions Jason Crampton Rosli Daud Keith M. Martin 130

Data Confidentiality and Query Verification

fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality Said Oulmakhzoune Nora Cuppens-Boulahia Frédéric Cuppens Stephane Morucci 146

Efficient Inference Control for Open Relational Queries Joachim Biskup Sven Hartmann Sebastian Link Jan-Hendrik Lochner 162

Query Racing: Fast Completeness Certification of Query Results Bernardo Palazzi Maurizio Pizzonia Stefano Pucacco 177

Policy Definition and Enforcement

Mining Likely Properties of Access Control Policies via Association Rule Mining JeeHyun Hwang Tao Xie Vincent Hu Mine Altunay 193

Scalable and Efficient Reasoning for Enforcing Role-Based Access Control Tyrone Cadenhead Mirat Kantarcioglu Bhavani Thuraiaingham 209

Enforcing Request Integrity in Web Applications Karthick Jayaraman Grzegorz Lewandowski Paul G. Talaga Steve J. Chapin 225

Trust and Identity Management

Using Trust-Based Information Aggregation for Predicting Security Level of Systems Siv Hilde Houmb Sudip Chakraborty Indrakshi Ray Indrajit Ray 241

Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms Aarthi Nagarajan Vijay Varadharajan 257

Towards Privacy-Enhancing Identify Management in Mashup-Providing Platforms Jan Zibuschka Matthias Herbert Heiko Roßnagel 273

Short Papers

An Access Control Model for Web Databases Ahlem Bouchahda-Ben Tekaya Nhan Le Thanh Adel Bouhoula Faten Labbene-Ayachi 287

Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems Hasan Qunoo Mark Ryan 295

Evaluating the Risk of Adopting RBAC Roles Alessandro Colantonio Roberto Di Pietro Alberto Ocello Nino Vincenzo Verde 303

Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance Amril Syalim Takashi Nishide Kouichi Sakurai 311

When ABE Meets RSS Yu Chen Hyun Sung Kim Jianbin Hu Zhong Chen 319

PriMan: A Privacy-Preserving Identity Framework Kristof Verslype Pieter Verhaeghe Jorn Lapon Vincent Naessens Bart De Decker 327

Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach Alex Hai Wang 335

Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach Ramaswamy Chandramouli 343

A Secure RFID Ticket System for Public Transport Kun Peng Feng Bao 350

Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols Suratose Tritilanunt 358

Secure Location Verification: A Security Analysis of GPS Signal Authentication Georg T. Becker Sherman C. Lo David S. De Lorenzo Per K. Enge Christof Paar 366

Author Index 375

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews