DBSec 2014 July 14, 2014 to July 16, 2014, Vienna, Austria

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Optimizing Integrity Checks for Join Queries in the Cloud Sushil Jajodia , Pierangela Samarati , Sabrina Vimercati , Sara Foresti , Stefano Paraboschi N/A
Data Leakage Quantification Milan Petkovic , Nicola Zannone , Sokratis Vavilis N/A
Attribute-aware Relationship-based Access Control for Online Social Networks Yuan Cheng , Jaehong Park , Ravi Sandhu N/A
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure Lingyu Wang , Jaideep Vaidya , Haibing Lu , Yuan Hong N/A
Consistent Query Plan Generation in Secure Cooperative Data Access Sushil Jajodia , Meixing Le , Krishna Kant N/A
Design Patterns for Multiple Stakeholders in Social Computing Philip Fong , Pooya Mehregan N/A
Dynamic Workflow Adjustment With Security Constraints Haibing Lu , Yuan Hong , Yanjiang Yang , Lian Duan , Yi Fang N/A
ELITE: zEro Links Identity managemenT systEm Nora Cuppens-boulahia , Indrajit Ray , Tarik Moataz , Indrakshi Ray , Frédéric Cuppens N/A
FSquaDRA: Fast Detection of Repackaged Applications Bruno Crispo , Olga Gadyatskaya , Yury Zhauniarovich , Francesco La Spina , Ermanno Moser N/A
Hunting the Unknown – White-Box Database Leakage Detection Milan Petkovic , Elisa Costante , Jerry Den Hartog , Etalle Sandro , Mykola Pechenizkiy N/A
Incremental Analysis of Evolving Administrative Role Based Access Control Policies Silvio Ranise , Anh Truong N/A
Integrity Assurance for Outsourced Databases without DBMS Modification Wei Wei , Ting Yu N/A
Mining Attribute-Based Access Control Policies from Logs Zhongyuan Xu , Scott d. Stoller N/A
Practical Private Information Retrieval from a Time-Varying, Multi-Attribute, and Multiple-Occurrence Database Giovanni Di Crescenzo , Debra L. Cook , Allen Mcintosh , Euthimios Panagos N/A
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds Nora Cuppens-boulahia , Indrajit Ray , Tarik Moataz , Indrakshi Ray , Benjamin Justus , Frédéric Cuppens N/A
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials Daniel Slamanig , Christian Hanser , David Derler N/A
Randomly Partitioned Encryption for Cloud Databases Tahmineh Sanamrad , Lucas Braun , Donald Kossmann , Ramarathnam Venkatesan N/A
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud Dima Alhadidi , Mourad Debbabi , Samira Barouti , Feras Aljumah N/A
Specification and Deployment of Integrated Security Policies for Outsourced Data Nora Cuppens-boulahia , Frédéric Cuppens , Anis Bkakria , David Gross-amblard N/A
Towards Secure Cloud Database with Fine-Grained Access Control Li Xiong , Vaidy Sunderam , Michael Solomon N/A
Toward Software Diversity in Heterogeneous Networked Systems Sencun Zhu , Robert Erbacher , Chu Huang N/A
`Who, When, and Where?’ Location Proof Assertion for Mobile Devices Shams Zawoad , Ragib Hasan , Rasib Khan , Md Munirul Haque N/A
A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation using Bloom Filters Vikas Ashok , Ravi Mukkamala N/A
Efficient and Enhanced Solutions for Content Sharing in DRM Systems Michal Davidson , Ehud Gudes , Tamir Tassa N/A
On Minimizing the Size of Encrypted Databases Giovanni Di Crescenzo , David Shallcross N/A