Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
Location Privacy Protection Through Obfuscation-Based Techniques. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Steve Barker, Gail-Joon Ahn (eds.) |
Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Clara Bertolissi, Maribel Fernández, Steve Barker |
Dynamic Event-Based Access Control as Term Rewriting. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jan Paul Kolter, Rolf Schillinger, Günther Pernul |
A Privacy-Enhanced Attribute-Based Access Control System. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera |
XACML Policies for Exclusive Resource Usage. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham |
Enforcing Honesty in Assured Information Sharing Within a Distributed System. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Indrakshi Ray, Manachai Toahchoodee |
A Spatio-temporal Role-Based Access Control Model. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian |
gVault: A Gmail Based Cryptographic Network File System. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie |
Security Patterns for Physical Access Control Systems. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
physical access control, security, access control, software patterns, intelligent buildings |
1 | Joachim Biskup, Torben Weibert |
Confidentiality Policies for Controlled Query Evaluation. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
confidentiality policies, Inference control, logic databases |
1 | Vijayalakshmi Atluri, Heechang Shin |
Efficient Security Policy Enforcement in a Location Based Service Environment. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia |
Measuring the Overall Security of Network Configurations Using Attack Graphs. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Isabel F. Cruz, Roberto Tamassia, Danfeng Yao |
Privacy-Preserving Schema Matching Using Mutual Information. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray |
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mustafa Canim, Murat Kantarcioglu |
Design and Analysis of Querying Encrypted Data in Relational Databases. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill |
Provably-Secure Schemes for Basic Query Support in Outsourced Databases. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Anna Zych, Milan Petkovic, Willem Jonker |
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Yingjiu Li, Robert H. Deng |
New Paradigm of Inference Control with Trusted Computing. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
security protocol, trusted computing, auditing, Inference control |
1 | Julien Lafaye, David Gross-Amblard |
XML Streams Watermarking. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lingyu Wang 0001, Chao Yao, Anoop Singhal, Sushil Jajodia |
Interactive Analysis of Attack Graphs Using Relational Queries. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Geri Georg, Siv Hilde Houmb, Indrakshi Ray |
Aspect-Oriented Risk Driven Development of Secure Applications. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Vijayalakshmi Atluri, Heechang Shin |
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton |
Discretionary and Mandatory Controls for Role-Based Administration. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati |
Enhancing User Privacy Through Data Handling Policies. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Sudip Chakraborty |
A Framework for Flexible Access Control in Digital Library Systems. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Philip Robinson, Florian Kerschbaum, Andreas Schaad |
From Business Process Choreography to Authorization Policies. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Einar Mykletun, Gene Tsudik |
Aggregation Queries in the Database-As-a-Service Model. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nicola Zannone, Sushil Jajodia, Duminda Wijesekera |
Creating Objects in the Flexible Authorization Framework. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan |
Authenticating Multi-dimensional Query Results in Data Publishing. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Lena Wiese |
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
confidentiality of data, complete database systems, Branch and Bound, propositional logic, inference control, SAT solving, lying, Controlled Query Evaluation |
1 | Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe |
Authrule: A Generic Rule-Based Authorization Module. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael T. Goodrich, Roberto Tamassia, Danfeng Yao |
Notarized Federated Identity Management for Web Services. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Da-Wei Wang 0004, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu |
Information Theoretical Analysis of Two-Party Secret Computation. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
Privacy Analysis, Scalar Product, Private Computation |
1 | Ernesto Damiani, Peng Liu (eds.) |
Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari |
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Martin Wimmer 0001, Alfons Kemper, Maarten Rits, Volkmar Lotz |
Consolidating the Access Control of Composite Applications and Workflows. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nataliya Rassadko |
Policy Classes and Query Rewriting Algorithm for XML Security Views. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann |
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham |
Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Security Policy, Firewalls, Anomalies, Packet Filters |
1 | Noa Tuval, Ehud Gudes |
Resolving Information Flow Conflicts in RBAC Systems. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
role graph consistency, canonical groups, Role based access control |
1 | Steve Barker, Maribel Fernández |
Term Rewriting for Access Control. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Ting Chiang, Da-Wei Wang 0004, Churn-Jung Liau, Tsan-sheng Hsu |
Secrecy of Two-Party Secure Computation. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
Privacy Analysis, Scalar Product, Private Computation |
1 | Sushil Jajodia, Duminda Wijesekera (eds.) |
Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kun Bai, Alex Hai Wang, Peng Liu 0005 |
Towards Database Firewalls. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Guang-Lei Song, Kang Zhang 0001, Bhavani Thuraisingham, Jun Kong |
Secure Model Management Operations for the Web. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joon S. Park, Harish S. Krishnan |
Trusted Identity and Session Management Using Secure Cookies. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
.NET Passport, Identity Management, Cookies |
1 | Sarath Indrakanti, Vijay Varadharajan |
An Authorization Architecture for Web Services. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Inja Youn, Csilla Farkas, Bhavani Thuraisingham |
Multilevel Secure Teleconferencing over Public Switched Telephone Network. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray |
Security Vulnerabilities in Software Systems: A Quantitative Perspective. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Alex X. Liu, Mohamed G. Gouda |
Complete Redundancy Detection in Firewalls. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
Redundant Rules, Network Security, Firewall |
1 | Murat Kantarcioglu, Chris Clifton |
Security Issues in Querying Encrypted Data. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Glen Nuckolls |
Verified Query Results from Hybrid Authentication Trees. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert |
Trading Off Security in a Service Oriented Architecture. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jun Li, Edward Omiecinski |
Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
Towards Privacy-Enhanced Authorization Policies and Languages. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes |
Designing Secure Indexes for Encrypted Databases. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Schaad |
Revocation of Obligation and Authorisation Policy Objects. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala |
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting |
Role Slices: A Notation for RBAC Permission Assignment and Enforcement. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Amihai Motro, Francesco Parisi-Presicce |
Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Spalka, Jan Lehnhardt |
A Comprehensive Approach to Anomaly Detection in Relational Databases. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
relational databases, anomaly detection, Database security, misuse detection |
1 | Justin Zhijun Zhan, Stan Matwin, LiWu Chang |
Privacy-Preserving Collaborative Association Rule Mining. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
security, Privacy, association rule mining |
1 | Joachim Biskup, Barbara Sprick, Lena Wiese |
Secure Mediation with Mobile Code. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Wei Jiang, Chris Clifton |
Privacy-Preserving Distributed k-Anonymity. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, k-anonymity |
1 | Jaideep Vaidya, Chris Clifton |
Privacy-Preserving Decision Trees over Vertically Partitioned Data. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Theodore Johnson, S. Muthukrishnan 0001, Oliver Spatscheck, Divesh Srivastava |
Streams, Security and Scalability. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tai Xin, Yajie Zhu, Indrakshi Ray |
Reliable Scheduling of Advanced Transactions. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Csilla Farkas, Pierangela Samarati (eds.) |
Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain |
DBSec |
2004 |
DBLP BibTeX RDF |
|
1 | Ravi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley |
Policy-based Security Management for Enterprise Systems. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Steve Barker |
Web Resource Usage Control in RSCLP. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mei Ge, Sylvia L. Osborn |
A Design for Parameterized Roles. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ladislav Huraj, Helmut Reiser |
Efficient Verification of Delegation in Distributed Group Membership Management. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Vijayalakshmi Atluri, Qi Guo |
STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel D. Pontikakis, Achilleas A. Tsitsonis, Vassilios S. Verykios |
An Experimental Study of Distortion-Based Techniques for Association Rule Hiding. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hakan Hacigümüs, Sharad Mehrotra |
Performance-Conscious Key Management in Encrypted Databases. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Indrakshi Ray, Tai Xin |
Implementing Real-Time Update of Access Control Policies. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce |
Information Flow Analysis for File Systems and Databases Using Labels. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ernesto Damiani, Sabrina De Capitani di Vimercati |
Invited Talk - Towards Semantics-Aware Access Control. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Tomas Hajek |
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Aybar C. Acar, Amihai Motro |
Why Is this User Asking so Many Questions? Explaining Sequences of Queries. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Schaad |
An Extended Analysis of Delegating Obligations. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Inja Youn, Duminda Wijesekera |
Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Lawrence H. Cox |
Invited Talk - Inference Control Problems in Statistical Database Query Systems. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray (eds.) |
Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA |
DBSec |
2004 |
DBLP BibTeX RDF |
|
1 | Da-Wei Wang 0004, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen |
On The Damage and Compensation of Privacy Leakage. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Torben Weibert |
Refusal in Incomplete Databases. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Justin Zhijun Zhan, LiWu Chang, Stan Matwin |
Privacy-Preserving Multi-Party Decision Tree Induction. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting |
RBAC/MAC Security Analysis and Design for UML. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yanjun Zuo, Brajendra Panda |
Damage Discovery in Distributed Database Systems. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul |
A Pattern System for Access Control. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yingjiu Li, Vipin Swarup, Sushil Jajodia |
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jaehong Park, Xinwen Zhang, Ravi S. Sandhu |
Attribute Mutability in Usage Control. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart |
Configuring Storage Area Networks for Mandatory Security. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Joon S. Park, Abhishek Jain |
A Framework for Trusted Wireless Sensor Networks. |
DBSec |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Steve Barker, Paul Douglas |
RBAC Policy Implementation for SQL Databases. |
DBSec |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi |
Remote Computer Fingerprinting for Cyber Crime Investigations. |
DBSec |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi |
Secure Authorisation for Web Services. |
DBSec |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jong P. Yoon |
High-speed Access Control for XML Documents. |
DBSec |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Marco Cremonini, Ernesto Damiani, Pierangela Samarati |
Semantics-Aware Perimeter Protection. |
DBSec |
2003 |
DBLP DOI BibTeX RDF |
|
1 | David W. Chadwick, Edward Ball 0002, M. V. Sahalayev |
Modifying LDAP to Support PKI. |
DBSec |
2003 |
DBLP DOI BibTeX RDF |
|