Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings

Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings

by Pierangela Samarati (Editor)

Paperback(2015)

$89.99
Use Standard Shipping. For guaranteed delivery by December 24, use Express or Expedited Shipping.

Product Details

ISBN-13: 9783319208091
Publisher: Springer International Publishing
Publication date: 06/16/2015
Series: Lecture Notes in Computer Science , #9149
Edition description: 2015
Pages: 364
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce.- Towards Collaborative Query Planning in Multi-party Database Networks.- Privacy-Preserving Range Queries from Keyword Queries.- An Administrative Model for Relationship-Based Access Control.- Migrating from DAC to RBAC.- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios.- Privacy Preserving Record Matching Using Automated Semi-trusted Broker.- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid.- Privacy-Preserving Public Transport Ticketing System.- Expiration and Revocation of Keys for Attribute-Based Signatures.- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis.- Constructing Inference-Proof Belief Mediators.- Personalized Composition of Trustful Reputation Systems.- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs.- Sanitization of Call Detail Records via Differentially-Private Bloom Filters.- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System.- Integrating Attributes into Role-Based Access Control.- Automated Translation of End User Policies for Usage Control Enforcement.- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks.- A Topology Based Flow Model for Computing Domain Reputation.- FPGuard: Detection and Prevention of Browser Fingerprinting.- Stream Processing with Secure Information Flow Constraints.- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies.- Inference Leakage Detection for Authorization Policies over RDF Data.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews