Query and Data Privacy |
Generalizing PIR for Practical Private Retrieval of Public Data / Shiyuan Wang ; Divyakant Agrawal ; Amr El Abbadi |
A Logic of Privacy / Steve Barker ; Valerio Genovese |
Understanding Privacy Risk of Publishing Decision Trees / Zutao Zhu ; Wenliang Du |
Data Protection |
Secure Outsourcing of DNA Searching via Finite Automata / Marina Blanton ; Mehrdad Aliasgari |
A Labelling System for Derived Data Control / Enrico Scalavino ; Vaibhav Gowadia ; Emil C. Lupu |
On the Identification of Property Based Generalizations in Microdata Anonymization / Rinku Dewri ; Indrajit Ray ; Indrakshi Ray ; Darrell Whitley |
Access Control |
Role Mining in the Presence of Noise / Jaideep Vaidya ; Vijayalakshmi Atluri ; Qi Guo ; Haibing Lu |
Distributed and Secure Access Control in P2P Databases / Angela Bonifati ; Ruilin Liu ; Hui (Wendy) Wang |
Constructing Key Assignment Schemes from Chain Partitions / Jason Crampton ; Rosli Daud ; Keith M. Martin |
Data Confidentiality and Query Verification |
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality / Said Oulmakhzoune ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Stephane Morucci |
Efficient Inference Control for Open Relational Queries / Joachim Biskup ; Sven Hartmann ; Sebastian Link ; Jan-Hendrik Lochner |
Query Racing: Fast Completeness Certification of Query Results / Bernardo Palazzi ; Maurizio Pizzonia ; Stefano Pucacco |
Policy Definition and Enforcement |
Mining Likely Properties of Access Control Policies via Association Rule Mining / JeeHyun Hwang ; Tao Xie ; Vincent Hu ; Mine Altunay |
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control / Tyrone Cadenhead ; Mirat Kantarcioglu ; Bhavani Thuraiaingham |
Enforcing Request Integrity in Web Applications / Karthick Jayaraman ; Grzegorz Lewandowski ; Paul G. Talaga ; Steve J. Chapin |
Trust and Identity Management |
Using Trust-Based Information Aggregation for Predicting Security Level of Systems / Siv Hilde Houmb ; Sudip Chakraborty |
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms / Aarthi Nagarajan ; Vijay Varadharajan |
Towards Privacy-Enhancing Identify Management in Mashup-Providing Platforms / Jan Zibuschka ; Matthias Herbert ; Heiko Roßnagel |
Short Papers |
An Access Control Model for Web Databases / Ahlem Bouchahda-Ben Tekaya ; Nhan Le Thanh ; Adel Bouhoula ; Faten Labbene-Ayachi |
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems / Hasan Qunoo ; Mark Ryan |
Evaluating the Risk of Adopting RBAC Roles / Alessandro Colantonio ; Roberto Di Pietro ; Alberto Ocello ; Nino Vincenzo Verde |
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance / Amril Syalim ; Takashi Nishide ; Kouichi Sakurai |
When ABE Meets RSS / Yu Chen ; Hyun Sung Kim ; Jianbin Hu ; Zhong Chen |
PriMan: A Privacy-Preserving Identity Framework / Kristof Verslype ; Pieter Verhaeghe ; Jorn Lapon ; Vincent Naessens ; Bart De Decker |
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach / Alex Hai Wang |
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach / Ramaswamy Chandramouli |
A Secure RFID Ticket System for Public Transport / Kun Peng ; Feng Bao |
Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols / Suratose Tritilanunt |
Secure Location Verification: A Security Analysis of GPS Signal Authentication / Georg T. Becker ; Sherman C. Lo ; David S. De Lorenzo ; Per K. Enge ; Christof Paar |
Author Index |
Query and Data Privacy |
Generalizing PIR for Practical Private Retrieval of Public Data / Shiyuan Wang ; Divyakant Agrawal ; Amr El Abbadi |
A Logic of Privacy / Steve Barker ; Valerio Genovese |