Data Privacy Management and Autonomous Spontaneus Security

6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers

  • Joaquin Garcia-Alfaro
  • Guillermo Navarro-Arribas
  • Nora Cuppens-Boulahia
  • Sabrina de Capitani di Vimercati
Conference proceedings

DOI: 10.1007/978-3-642-28879-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7122)

Table of contents (22 papers)

  1. Front Matter
  2. Keynote Address

    1. Privacy Challenges in RFID
      Gildas Avoine
      Pages 1-8
  3. Data Privacy Management

    1. Fake Injection Strategies for Private Phonetic Matching
      Alexandros Karakasidis, Vassilios S. Verykios, Peter Christen
      Pages 9-24
    2. A Design Phase for Data Sharing Agreements
      Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio, Luca Wiegand
      Pages 25-41
    3. A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings
      Javier Parra-Arnau, David Rebollo-Monedero, Jordi Forné
      Pages 42-57
    4. On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol
      Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi, Hamid Behnam
      Pages 90-103
    5. Inference-Proof View Update Transactions with Minimal Refusals
      Joachim Biskup, Cornelia Tadros
      Pages 104-121
    6. Representation-Independent Data Usage Control
      Alexander Pretschner, Enrico Lovat, Matthias Büchler
      Pages 122-140
    7. Using Personal Portfolios to Manage Customer Data
      Aimilia Tasidou, Pavlos S. Efraimidis
      Pages 141-154
  4. Autonomous and Spontaneous Security

    1. Using Requirements Engineering in an Automatic Security Policy Derivation Process
      Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, Gouenou Coatrieux et al.
      Pages 155-172
    2. Web Services Verification and Prudent Implementation
      Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
      Pages 173-189
    3. Evolving Security Requirements in Multi-layered Service-Oriented-Architectures
      Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira, Herve Grall, Mario Südholt
      Pages 190-205
    4. Risk-Based Auto-delegation for Probabilistic Availability
      Leanid Krautsevich, Fabio Martinelli, Charles Morisset, Artsiom Yautsiukhin
      Pages 206-220
    5. Intra-role Progression in RBAC: An RPG-Like Access Control Scheme
      Carles Martínez-García, Guillermo Navarro-Arribas, Joan Borrell
      Pages 221-234
    6. Distributed Orchestration of Web Services under Security Constraints
      Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani
      Pages 235-252
    7. On the Key Schedule Strength of PRESENT
      Julio Cesar Hernandez-Castro, Pedro Peris-Lopez, Jean-Philippe Aumasson
      Pages 253-263
    8. Network Securing against Threatening Requests
      Yulong Fu, Ousmane Kone
      Pages 280-294

About these proceedings


This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011.

The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper.
The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.


Web services cryptography formal methods network monitoring semantic community

Editors and affiliations

  • Joaquin Garcia-Alfaro
    • 1
  • Guillermo Navarro-Arribas
    • 2
  • Nora Cuppens-Boulahia
    • 3
  • Sabrina de Capitani di Vimercati
    • 4
  1. 1.TELECOM-BretagneCesson Sévigné CedexFrance
  2. 2.Universitat Autonoma de BarcelonaBellaterraSpain
  3. 3.Institut Télécom, Télécom BretagneCesson-SévignéFrance
  4. 4.Dipartimento di Tecnologie dell’InformazioneUniversità degli Studi di MilanoCremaItaly

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-28878-4
  • Online ISBN 978-3-642-28879-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349