Data and Applications Security and Privacy XXV

25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings

  • Yingjiu Li
Conference proceedings DBSec 2011

DOI: 10.1007/978-3-642-22348-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6818)

Table of contents (26 papers)

  1. Front Matter
  2. Invited Papers

    1. Re-designing the Web’s Access Control System
      Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu
      Pages 4-11
    2. Integrated Management of Security Policies
      Stefano Paraboschi
      Pages 12-13
  3. Access Control I

    1. Cooperative Data Access in Multi-cloud Environments
      Meixing Le, Krishna Kant, Sushil Jajodia
      Pages 14-28
  4. Privacy-Preserving Data Applications I

    1. Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach
      Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati
      Pages 44-59
  5. Access Control II

    1. An Optimization Model for the Extended Role Mining Problem
      Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya
      Pages 76-89
    2. Dynamics in Delegation and Revocation Schemes: A Logical Approach
      Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert van der Torre
      Pages 90-105
  6. Data Confidentiality and Query Verification

    1. Multilevel Secure Data Stream Processing
      Raman Adaikkalavan, Indrakshi Ray, Xing Xie
      Pages 122-137
  7. Query and Data Privacy

    1. Query Processing in Private Data Outsourcing Using Anonymization
      Ahmet Erhan Nergiz, Chris Clifton
      Pages 138-153
    2. Private Database Search with Sublinear Query Time
      Keith B. Frikken, Boyang Li
      Pages 154-169
  8. Privacy-Preserving Data Applications II

    1. Efficient Distributed Linear Programming with Limited Disclosure
      Yuan Hong, Jaideep Vaidya, Haibing Lu
      Pages 170-185
    2. Privacy-Preserving Data Mining: A Game-Theoretic Approach
      Atsuko Miyaji, Mohammad Shahriar Rahman
      Pages 186-200
  9. Authentication and Secret Sharing

  10. Short Papers

    1. A Robust Remote User Authentication Scheme against Smart Card Security Breach
      Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee
      Pages 231-238
    2. N-Gram Based Secure Similar Document Detection
      Wei Jiang, Bharath K. Samanthula
      Pages 239-246

About these proceedings


This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.


Web security authentication identity based encryption medical image privacy network security

Editors and affiliations

  • Yingjiu Li
    • 1
  1. 1.School of Information Systems (SIS)Singapore Management University (SMU)SingaporeSingapore

Bibliographic information

  • Copyright Information IFIP International Federation for Information Processing 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-22347-1
  • Online ISBN 978-3-642-22348-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349