Data Privacy Management and Autonomous Spontaneus Security

6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers

ISBN: 978-3-642-28878-4 (Print) 978-3-642-28879-1 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Keynote Address

    1. No Access

      Book Chapter

      Pages 1-8

      Privacy Challenges in RFID

  3. Data Privacy Management

    1. No Access

      Book Chapter

      Pages 9-24

      Fake Injection Strategies for Private Phonetic Matching

    2. No Access

      Book Chapter

      Pages 25-41

      A Design Phase for Data Sharing Agreements

    3. No Access

      Book Chapter

      Pages 42-57

      A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings

    4. No Access

      Book Chapter

      Pages 58-71

      On the Complexity of Aggregating Information for Authentication and Profiling

    5. No Access

      Book Chapter

      Pages 72-89

      Secure and Privacy-Aware Searching in Peer-to-Peer Networks

    6. No Access

      Book Chapter

      Pages 90-103

      On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol

    7. No Access

      Book Chapter

      Pages 104-121

      Inference-Proof View Update Transactions with Minimal Refusals

    8. No Access

      Book Chapter

      Pages 122-140

      Representation-Independent Data Usage Control

    9. No Access

      Book Chapter

      Pages 141-154

      Using Personal Portfolios to Manage Customer Data

  4. Autonomous and Spontaneous Security

    1. No Access

      Book Chapter

      Pages 155-172

      Using Requirements Engineering in an Automatic Security Policy Derivation Process

    2. No Access

      Book Chapter

      Pages 173-189

      Web Services Verification and Prudent Implementation

    3. No Access

      Book Chapter

      Pages 190-205

      Evolving Security Requirements in Multi-layered Service-Oriented-Architectures

    4. No Access

      Book Chapter

      Pages 206-220

      Risk-Based Auto-delegation for Probabilistic Availability

    5. No Access

      Book Chapter

      Pages 221-234

      Intra-role Progression in RBAC: An RPG-Like Access Control Scheme

    6. No Access

      Book Chapter

      Pages 235-252

      Distributed Orchestration of Web Services under Security Constraints

    7. No Access

      Book Chapter

      Pages 253-263

      On the Key Schedule Strength of PRESENT

    8. No Access

      Book Chapter

      Pages 264-279

      A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines

    9. No Access

      Book Chapter

      Pages 280-294

      Network Securing against Threatening Requests

  5. Short Papers

    1. No Access

      Book Chapter

      Pages 295-302

      A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring

previous Page of 2