Skip to main content
  • Conference proceedings
  • © 2012

Data and Applications Security and Privacy XXVI

26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012, Proceedings

  • conference proceedings
  • State-of-the-art research
  • Up-to-date results

Conference proceedings info: DBSec 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

  2. Invited Paper

    1. Logics for Security and Privacy

      • Leendert van der Torre
      Pages 1-7
  3. Access Control

    1. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC

      • Xin Jin, Ram Krishnan, Ravi Sandhu
      Pages 41-55
  4. Confidentiality and Privacy

    1. Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies

      • Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann
      Pages 56-73
    2. Privacy Consensus in Anonymization Systems via Game Theory

      • Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini
      Pages 74-89
    3. Uniform Obfuscation for Location Privacy

      • Gianluca Dini, Pericle Perazzo
      Pages 90-105
  5. Smart Cards Security (Short Papers)

    1. Security Vulnerabilities of User Authentication Scheme Using Smart Card

      • Ravi Singh Pippal, Jaidhar C.D., Shashikala Tapaswi
      Pages 106-113
    2. A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard

      • Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet
      Pages 122-128
  6. Privacy-Preserving Technologies

    1. Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data

      • Robert Nix, Murat Kantarcioglu, Keesook J. Han
      Pages 129-144
    2. Security Limitations of Using Secret Sharing for Data Outsourcing

      • Jonathan L. Dautrich, Chinya V. Ravishankar
      Pages 145-160
    3. Privacy-Preserving Subgraph Discovery

      • Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil Adam, Vijayalakshmi Atluri
      Pages 161-176
  7. Data Management

    1. Decentralized Semantic Threat Graphs

      • Simon N. Foley, William M. Fitzgerald
      Pages 177-192
    2. Code Type Revealing Using Experiments Framework

      • Rami Sharon, Ehud Gudes
      Pages 193-206
    3. From MDM to DB2: A Case Study of Security Enforcement Migration

      • Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run
      Pages 207-222
  8. Intrusion and Malware

    1. XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks

      • Smitha Sundareswaran, Anna Cinzia Squicciarini
      Pages 223-238
    2. Randomizing Smartphone Malware Profiles against Statistical Mining Techniques

      • Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham
      Pages 239-254
  9. Probabilistic Attacks and Protection (Short Papers)

    1. Layered Security Architecture for Masquerade Attack Detection

      • Hamed Saljooghinejad, Wilson Naik Bhukya
      Pages 255-262

Other Volumes

  1. Data and Applications Security and Privacy XXVI

About this book

This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing.

Editors and Affiliations

  • Télécom Bretagne, Cesson Sévigné Cedex, France

    Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access