default search action
CODASPY 2011: San Antonio, TX, USA
- Ravi S. Sandhu, Elisa Bertino:
First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0466-5
Keynote talks
- Ravi S. Sandhu:
The challenge of data and application security and privacy (DASPY): are we up to it. 1-2 - Tal Malkin, Isamu Teranishi, Moti Yung:
Key dependent message security: recent results and applications. 3-12 - Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg, N. Asokan:
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures. 13-24 - John B. Dickson:
Software security: is ok good enough? 25-26
Security and privacy techniques for social networks
- Lei Jin, Hassan Takabi, James B. D. Joshi:
Towards active detection of identity clone attacks on online social networks. 27-38 - Mauro Conti, Arbnor Hasani, Bruno Crispo:
Virtual private social networks. 39-50 - Barbara Carminati, Elena Ferrari, Sandro Morasca, Davide Taibi:
A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks. 51-62
Insider threats and data leakage
- You Chen, Bradley A. Malin:
Detection of anomalous insiders in collaborative environments via relational analysis of access logs. 63-74 - Junfeng Yu, Shengzhi Zhang, Peng Liu, Zhitang Li:
LeakProber: a framework for profiling sensitive data leakage paths. 75-84 - Prachi Kumari, Alexander Pretschner, Jonas Peschla, Jens-Michael Kuhn:
Distributed data usage control for web applications: a social network implementation. 85-96
Performance evaluation and enhancement
- Sonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi:
MyABDAC: compiling XACML policies for attribute-based database access control. 97-108 - Daniel A. Mayer, Dominik Teubert, Susanne Wetzel, Ulrike Meyer:
Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets. 109-120 - Marko Komlenovic, Mahesh V. Tripunitara, Toufik Zitouni:
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC). 121-132
Secure provenance
- Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
A language for provenance access control. 133-144 - Haifeng Qian, Shouhuai Xu:
Non-interactive editable signatures for assured data provenance. 145-156
Privacy threats and protection techniques
- David Lorenzi, Jaideep Vaidya:
Identifying a critical threat to privacy through automatic image classification. 157-168 - Mummoorthy Murugesan, Wei Jiang, Ahmet Erhan Nergiz, Serkan Uzunbaz:
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations. 169-178 - Bowei Xi, Murat Kantarcioglu, Ali Inan:
Mixture of gaussian models and bayes error under differential privacy. 179-190
Novel models and systems for access control
- Philip W. L. Fong:
Relationship-based access control: protection model and policy language. 191-202 - Michael S. Kirkpatrick, Sam Kerr:
Enforcing physically restricted access control for remote data. 203-212 - Mohammad Jafari, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker, Nicholas Paul Sheppard:
Towards defining semantic foundations for purpose-based privacy policies. 213-224
Invited industry and application papers
- Dan Thomsen:
Practical policy patterns. 225-230 - Kenneth Brancik, Gabriel Ghinita:
The optimization of situational awareness for insider threat detection. 231-236
Secure data outsourcing
- Qingji Zheng, Shouhuai Xu:
Fair and dynamic proofs of retrievability. 237-248 - Keke Chen, Ramakanth Kavuluru, Shumin Guo:
RASP: efficient multidimensional range query on attack-resilient encrypted databases. 249-260
Novel applications of privacy techniques
- Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:
Privacy-preserving activity scheduling on mobile devices. 261-272 - Michael T. Goodrich, Florian Kerschbaum:
Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions. 273-282 - Xiaoyang Sean Wang:
Panel: research agenda for data and application security. 283-284
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.