Skip to main content
  • Conference proceedings
  • © 2012

Data Privacy Management and Autonomous Spontaneus Security

6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers

  • Up-to-date results
  • Fast-track conference proceedings
  • State-of-the-art research

Conference proceedings info: DPM 2011, SETOP 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Keynote Address

    1. Privacy Challenges in RFID

      • Gildas Avoine
      Pages 1-8
  3. Data Privacy Management

    1. Fake Injection Strategies for Private Phonetic Matching

      • Alexandros Karakasidis, Vassilios S. Verykios, Peter Christen
      Pages 9-24
    2. A Design Phase for Data Sharing Agreements

      • Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio, Luca Wiegand
      Pages 25-41
    3. A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings

      • Javier Parra-Arnau, David Rebollo-Monedero, Jordi Forné
      Pages 42-57
    4. On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol

      • Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi, Hamid Behnam
      Pages 90-103
    5. Inference-Proof View Update Transactions with Minimal Refusals

      • Joachim Biskup, Cornelia Tadros
      Pages 104-121
    6. Representation-Independent Data Usage Control

      • Alexander Pretschner, Enrico Lovat, Matthias Büchler
      Pages 122-140
    7. Using Personal Portfolios to Manage Customer Data

      • Aimilia Tasidou, Pavlos S. Efraimidis
      Pages 141-154
  4. Autonomous and Spontaneous Security

    1. Using Requirements Engineering in an Automatic Security Policy Derivation Process

      • Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, Gouenou Coatrieux et al.
      Pages 155-172
    2. Web Services Verification and Prudent Implementation

      • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
      Pages 173-189
    3. Evolving Security Requirements in Multi-layered Service-Oriented-Architectures

      • Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira, Herve Grall, Mario Südholt
      Pages 190-205
    4. Risk-Based Auto-delegation for Probabilistic Availability

      • Leanid Krautsevich, Fabio Martinelli, Charles Morisset, Artsiom Yautsiukhin
      Pages 206-220
    5. Intra-role Progression in RBAC: An RPG-Like Access Control Scheme

      • Carles Martínez-García, Guillermo Navarro-Arribas, Joan Borrell
      Pages 221-234
    6. Distributed Orchestration of Web Services under Security Constraints

      • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani
      Pages 235-252
    7. On the Key Schedule Strength of PRESENT

      • Julio Cesar Hernandez-Castro, Pedro Peris-Lopez, Jean-Philippe Aumasson
      Pages 253-263
    8. Network Securing against Threatening Requests

      • Yulong Fu, Ousmane Kone
      Pages 280-294

Other Volumes

  1. Data Privacy Management and Autonomous Spontaneus Security

About this book

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.

Editors and Affiliations

  • TELECOM-Bretagne, Cesson Sévigné Cedex, France

    Joaquin Garcia-Alfaro

  • Universitat Autonoma de Barcelona, Bellaterra, Spain

    Guillermo Navarro-Arribas

  • Institut Télécom, Télécom Bretagne, Cesson-Sévigné, France

    Nora Cuppens-Boulahia

  • Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Crema, Italy

    Sabrina Capitani di Vimercati

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access