Skip to main content
  • Conference proceedings
  • © 2013

Data Privacy Management and Autonomous Spontaneous Security

7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers

  • Up to date results
  • Fast track conference proceedings
  • State of the art research

Conference proceedings info: DPM 2012, SETOP 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 papers)

  1. Front Matter

  2. Data Privacy Management

    1. Fair Anonymous Authentication for Location Based Services

      • Panayiotis Kotzanikolaou, Emmanouil Magkos, Nikolaos Petrakos, Christos Douligeris, Vassilis Chrissikopoulos
      Pages 1-14
    2. Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems

      • Xihui Chen, David Fonkwe, Jun Pang
      Pages 29-42
    3. An Efficient and Secure Coding-Based Authenticated Encryption Scheme

      • Mohammed Meziani, Rachid El Bansarkhani
      Pages 43-60
    4. Differential Privacy in Tripartite Interaction: A Case Study with Linguistic Minorities in Canada

      • Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan
      Pages 75-88
    5. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

      • Carlo Blundo, Emiliano De Cristofaro, Paolo Gasti
      Pages 89-103
    6. SlopPy: Slope One with Privacy

      • Sébastien Gambs, Julien Lolive
      Pages 104-117
    7. A Semi-lattice Model for Multi-lateral Security

      • Florian Kammüller
      Pages 118-132
    8. Prioritized Execution of Privacy Policies

      • Ilaria Matteucci, Paolo Mori, Marinella Petrocchi
      Pages 133-145
    9. What Websites Know About You

      • Elisa Costante, Jerry den Hartog, Milan Petković
      Pages 146-159
    10. Automating Privacy Enforcement in Cloud Platforms

      • Peng Yu, Jakub Sendor, Gabriel Serme, Anderson Santana de Oliveira
      Pages 160-173
    11. Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven Approach

      • Kuzman Katkalov, Peter Fischer, Kurt Stenzel, Nina Moebius, Wolfgang Reif
      Pages 174-186
  3. Autonomous and Spontaneous Security

    1. AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing

      • Mohammad Ali Hadavi, Ernesto Damiani, Rasool Jalili, Stelvio Cimato, Zeinab Ganjei
      Pages 201-216
    2. Configuration Assessment as a Service

      • Matteo Maria Casalino, Henrik Plate, Serena Elisa Ponta
      Pages 217-226
    3. Automated Smartphone Security Configuration

      • William M. Fitzgerald, Ultan Neville, Simon N. Foley
      Pages 227-242
    4. μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks

      • Amrita Ghosal, Sanjib Sur, Sipra DasBit
      Pages 258-273

Other Volumes

  1. Data Privacy Management and Autonomous Spontaneous Security

About this book

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management.

Editors and Affiliations

  • Università degli Studi Roma Tre, Rome, Italy

    Roberto Pietro

  • Universitat Politècnica de Catalunya, Barcelona, Spain

    Javier Herranz

  • Università degli Studi di Milano, Milan, Italy

    Ernesto Damiani

  • University of Luxembourg, Luxembourg, Luxembourg

    Radu State

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access