Stop the war!
Остановите войну!
for scientists:
default search action
CODASPY 2012: San Antonio, TX, USA
- Elisa Bertino, Ravi S. Sandhu:
Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012. ACM 2012, ISBN 978-1-4503-1091-8
Database and storage security
- Qingji Zheng, Shouhuai Xu:
Secure and efficient proof of storage with deduplication. 1-12 - Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia:
Practical oblivious storage. 13-24 - Xiaowei Li, Wei Yan, Yuan Xue:
SENTINEL: securing database from logic flaws in web applications. 25-36
Security and privacy for social computing
- Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo, Peng Liu:
Stalking online: on user privacy in social networks. 37-48 - Xihui Chen, Jun Pang:
Measuring query privacy in location-based services. 49-60 - Suhendry Effendy, Roland H. C. Yap, Felix Halim:
Revisiting link privacy in social networks. 61-70
Access control enforcement
- Ninghui Li, Haining Chen, Elisa Bertino:
On practical specification and enforcement of obligations. 71-82 - Prachi Kumari, Alexander Pretschner:
Deriving implementation-level policies for usage control enforcement. 83-94 - Lujo Bauer, Yuan Liang, Michael K. Reiter, Chad Spensky:
Discovering access-control misconfigurations: new approaches and evaluation methodologies. 95-104 - Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Hong-Jia Zhao:
Comparison-based encryption for fine-grained access control in clouds. 105-116
Short papers session 1
- Glenn Bruns, Philip W. L. Fong, Ida Sri Rejeki Siahaan, Michael Huth:
Relationship-based access control: its expression and enforcement through hybrid logic. 117-124 - Xi Gong, Ting Yu, Adam J. Lee:
Bounding trust in reputation systems with incomplete information. 125-132 - Murillo Pontual, Andreas Gampe, Omar Chowdhury, Bazoumana Kone, Md. Shamim Ashik, William H. Winsborough:
The privacy in the time of the internet: secrecy vs transparency. 133-140 - Vincent Toubiana, Vincent Verdot, Benoit Christophe:
Cookie-based privacy issues on google services. 141-148 - Wanying Zhao, Jianwei Niu, William H. Winsborough:
Refinement-based design of a group-centric secure information sharing model. 149-156
Novel techniques for access control
- Ian M. Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo:
Risk-based security decisions under uncertainty. 157-168 - Fabio Martinelli, Charles Morisset:
Quantitative access control with partially-observable Markov decision processes. 169-180 - Nino Vincenzo Verde, Jaideep Vaidya, Vijay Atluri, Alessandro Colantonio:
Role engineering: from theory to practice. 181-192
Novel applications of privacy techniques
- Wen Ming Liu, Lingyu Wang:
Privacy streamliner: a two-stage approach to improving algorithm efficiency. 193-204 - Martin Kost, Johann Christoph Freytag:
Privacy analysis using ontologies. 205-216 - Yuxin Chen, Bo Luo:
S2A: secure smart household appliances. 217-228 - Musheer Ahmed, Mustaque Ahamad:
Protecting health information on mobile devices. 229-240
Short papers session 2
- Alessandro Armando, Silvio Ranise, Fatih Turkmen, Bruno Crispo:
Efficient run-time solving of RBAC user authorization queries: pushing the envelope. 241-248 - Konstantine Arkoudas, Akshay Vashist:
A model-theoretic approach to data anonymity and inference control. 249-256 - Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin Wu, Yonggang Wen:
Towards end-to-end secure content storage and delivery with public cloud. 257-266 - Jie Shi, Darren Sim, Yingjiu Li, Robert Huijie Deng:
SecDS: a secure EPC discovery service system in EPCglobal network. 267-274 - Hussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura:
Identifying native applications with high assurance. 275-282
Novel techniques for data security and privacy
- Mina Askari, Reihaneh Safavi-Naini, Ken Barker:
An information theoretic privacy and utility measure for data sanitization mechanisms. 283-294 - Kalpana Gondi, Prithvi Bisht, Praveen Venkatachari, A. Prasad Sistla, V. N. Venkatakrishnan:
SWIPE: eager erasure of sensitive data in large scale systems software. 295-306 - Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Leakage-free redactable signatures. 307-316 - Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning:
Detecting repackaged smartphone applications in third-party android marketplaces. 317-326
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.