Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012,

Data and Applications Security and Privacy XXVI

26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012, Proceedings

Cuppens-Boulahia, Nora, Cuppens, Frederic, Garcia-Alfaro, Joaquin (Eds.)

2012, X, 340 p. 91 illus.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$79.99

(net) price for USA

ISBN 978-3-642-31540-4

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$108.00

(net) price for USA

ISBN 978-3-642-31539-8

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • conference proceedings
  • State-of-the-art research
  • Up-to-date results

This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012.

The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing.

Content Level » Research

Keywords » authorization and authentication - data mining - information systems - security threats - vulnerability

Related subjects » Communication Networks - Database Management & Information Retrieval - Security and Cryptology - Software Engineering

Table of contents 

Invited Paper Logics for Security and Privacy.-Access Control A User-to-User Relationship-Based Access Control Model for Online Social Networks.-Automated and Efficient Analysis of Role-Based Access Control with Attributes.-A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC.-Confidentiality and Privacy.-Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies.-Privacy Consensus in Anonymization Systems via Game Theory .-Uniform Obfuscation for Location Privacy.-Smart Cards Security (Short Papers).-Security Vulnerabilities of User Authentication Scheme Using Smart Card.-Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.-A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard.-Privacy-Preserving Technologies.-Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.-Security Limitations of Using Secret Sharing for Data Outsourcing.-Privacy-Preserving Subgraph Discovery.-Data Management.-Decentralized Semantic Threat Graphs.-Code Type Revealing Using Experiments Framework.-From MDM to DB2: A Case Study of Security Enforcement Migration.-Intrusion and Malware.-XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks.-Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.-Probabilistic Attacks and Protection (Short Papers).-Layered Security Architecture for Masquerade Attack Detection.-k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.-Reconstruction Attack through Classifier Analysis.-Cloud Computing.-Distributed Data Federation without Disclosure of User Existence.-Improving Virtualization Security by Splitting Hypervisor into Smaller Components.-Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.-

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Systems and Data Security.