close
1.

電子ブック

EB
Kudakwashe Dube, Sushil Jajodia, Fredrick Mtenzi, Charles A. Shoniregun
出版情報: Springer eBooks Computer Science , Springer US, 2010
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction
Healthcare Information Security Standards, Legislation and Technologies
Security, Privacy and Confidentiality for Healthcare Information
Security, Privacy and Confidentiality in Healthcare Systems
Security Framework and Model for Healthcare Information Management
Evaluation of Security Models and Frameworks for in Healthcare Information
Discussion and Conclusion
References
Index
Preface
Introduction
Healthcare Information Security Standards, Legislation and Technologies
2.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Sushil Jajodia, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini
Network Security - I
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo
Security Protocols - I
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung
Author Index
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
3.

電子ブック

EB
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang
出版情報: Springer eBooks Computer Science , Springer New York, 2011
所蔵情報: loading…
4.

電子ブック

EB
Henk C. A. van Tilborg, Sushil Jajodia
出版情報: Springer eBooks Computer Science , Springer US, 2011
所蔵情報: loading…
5.

電子ブック

EB
Sushil Jajodia, Anup K. Ghosh
出版情報: Springer eBooks Computer Science , Springer New York, 2013
所蔵情報: loading…
6.

電子ブック

EB
Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Takeo Kanade, Roger King, Dennis McLeod, Maria E. Orlowska, S. Spaccapietra, Leon Strous, Roger B. King
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
International Conference on Ontologies, DataBases, and Applications of Semantics for Large Scale Information Systems (ODBase 2003)
Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases / Raphael Volz ; Steffen Staab ; Boris Motik
Ontology Translation on the Semantic Web / Dejing Dou ; Drew McDermott ; Peishen Qi
Compound Term Composition Algebra: The Semantics / Yannis Tzitzikas ; Anastasia Analyti ; Nicolas Spyratos
Dynamic Pattern Mining: An Incremental Data Clustering Approach / Seokkyung Chung ; Dennis McLeod
International Conference on Cooperative Information Systems (CoopIS 2003)
A Knowledge Network Approach for Implementing Active Virtual Marketplaces / Minsoo Lee ; Stanley Y.W. Su ; Herman Lam
Stream Integration Techniques for Grid Monitoring / Andy Cooke ; Alasdair J.G. Gray ; Werner Nutt
6th IFIP TC 11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS 2003)
Information Release Control: A Learning-Based Architecture / Claudio Bettini ; X. Sean Wang ; Sushil Jajodia
Enforcing Semantics-Aware Security in Multimedia Surveillance / Naren Kodali ; Csilla Farkas ; Duminda Wijesekera
Author Index
International Conference on Ontologies, DataBases, and Applications of Semantics for Large Scale Information Systems (ODBase 2003)
Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases / Raphael Volz ; Steffen Staab ; Boris Motik
Ontology Translation on the Semantic Web / Dejing Dou ; Drew McDermott ; Peishen Qi
7.

電子ブック

EB
Sushil Jajodia, Takeo Kanade, Javier Lopez, Javier L?pez
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
8.

電子ブック

EB
Claudio Bettini, Sushil Jajodia, Takeo Kanade, Pierangela Samarati, X. Sean Wang
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Anonymity and Historical-Anonymity in Location-Based Services / Claudio Bettini ; Sergio Mascetti ; X. Sean Wang ; Dario Freni ; Sushil Jajodia
Location Privacy Techniques in Client-Server Architectures / Christian S. Jensen ; Hua Lu ; Man Lung Yiu
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services / Ali Khoshgozaran ; Cyrus Shahabi
Privacy Preservation over Untrusted Mobile Networks / Claudio A. Ardagna ; Pierangela Samarati ; Angelos Stavrou
Access Control in Location-Based Services / Marco Cremonini ; Sabrina De Capitani di Vimercati
Location Privacy in RFID Applications / Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Privacy in Georeferenced Context-Aware Services: A Survey / Daniele Riboni ; Linda Pareschi
Safety and Privacy in Vehicular Communications / Josep Domingo-Ferrer ; Qianhong Wu
Privacy Preserving Publication of Moving Object Data / Francesco Bonchi
Author Index
Anonymity and Historical-Anonymity in Location-Based Services / Claudio Bettini ; Sergio Mascetti ; X. Sean Wang ; Dario Freni ; Sushil Jajodia
Location Privacy Techniques in Client-Server Architectures / Christian S. Jensen ; Hua Lu ; Man Lung Yiu
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services / Ali Khoshgozaran ; Cyrus Shahabi
9.

電子ブック

EB
Sara Foresti, Sushil Jajodia
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Query and Data Privacy
Generalizing PIR for Practical Private Retrieval of Public Data / Shiyuan Wang ; Divyakant Agrawal ; Amr El Abbadi
A Logic of Privacy / Steve Barker ; Valerio Genovese
Understanding Privacy Risk of Publishing Decision Trees / Zutao Zhu ; Wenliang Du
Data Protection
Secure Outsourcing of DNA Searching via Finite Automata / Marina Blanton ; Mehrdad Aliasgari
A Labelling System for Derived Data Control / Enrico Scalavino ; Vaibhav Gowadia ; Emil C. Lupu
On the Identification of Property Based Generalizations in Microdata Anonymization / Rinku Dewri ; Indrajit Ray ; Indrakshi Ray ; Darrell Whitley
Access Control
Role Mining in the Presence of Noise / Jaideep Vaidya ; Vijayalakshmi Atluri ; Qi Guo ; Haibing Lu
Distributed and Secure Access Control in P2P Databases / Angela Bonifati ; Ruilin Liu ; Hui (Wendy) Wang
Constructing Key Assignment Schemes from Chain Partitions / Jason Crampton ; Rosli Daud ; Keith M. Martin
Data Confidentiality and Query Verification
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality / Said Oulmakhzoune ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Stephane Morucci
Efficient Inference Control for Open Relational Queries / Joachim Biskup ; Sven Hartmann ; Sebastian Link ; Jan-Hendrik Lochner
Query Racing: Fast Completeness Certification of Query Results / Bernardo Palazzi ; Maurizio Pizzonia ; Stefano Pucacco
Policy Definition and Enforcement
Mining Likely Properties of Access Control Policies via Association Rule Mining / JeeHyun Hwang ; Tao Xie ; Vincent Hu ; Mine Altunay
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control / Tyrone Cadenhead ; Mirat Kantarcioglu ; Bhavani Thuraiaingham
Enforcing Request Integrity in Web Applications / Karthick Jayaraman ; Grzegorz Lewandowski ; Paul G. Talaga ; Steve J. Chapin
Trust and Identity Management
Using Trust-Based Information Aggregation for Predicting Security Level of Systems / Siv Hilde Houmb ; Sudip Chakraborty
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms / Aarthi Nagarajan ; Vijay Varadharajan
Towards Privacy-Enhancing Identify Management in Mashup-Providing Platforms / Jan Zibuschka ; Matthias Herbert ; Heiko Roßnagel
Short Papers
An Access Control Model for Web Databases / Ahlem Bouchahda-Ben Tekaya ; Nhan Le Thanh ; Adel Bouhoula ; Faten Labbene-Ayachi
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems / Hasan Qunoo ; Mark Ryan
Evaluating the Risk of Adopting RBAC Roles / Alessandro Colantonio ; Roberto Di Pietro ; Alberto Ocello ; Nino Vincenzo Verde
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance / Amril Syalim ; Takashi Nishide ; Kouichi Sakurai
When ABE Meets RSS / Yu Chen ; Hyun Sung Kim ; Jianbin Hu ; Zhong Chen
PriMan: A Privacy-Preserving Identity Framework / Kristof Verslype ; Pieter Verhaeghe ; Jorn Lapon ; Vincent Naessens ; Bart De Decker
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach / Alex Hai Wang
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach / Ramaswamy Chandramouli
A Secure RFID Ticket System for Public Transport / Kun Peng ; Feng Bao
Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols / Suratose Tritilanunt
Secure Location Verification: A Security Analysis of GPS Signal Authentication / Georg T. Becker ; Sherman C. Lo ; David S. De Lorenzo ; Per K. Enge ; Christof Paar
Author Index
Query and Data Privacy
Generalizing PIR for Practical Private Retrieval of Public Data / Shiyuan Wang ; Divyakant Agrawal ; Amr El Abbadi
A Logic of Privacy / Steve Barker ; Valerio Genovese
10.

電子ブック

EB
Sushil Jajodia (ed), Sushil Jajodia, Krishna Kant
出版情報: Springer eBooks Computer Science , Springer New York, 2014
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼