Data and Applications Security and Privacy XXIX

29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings

  • Pierangela Samarati
Conference proceedings DBSec 2015

DOI: 10.1007/978-3-319-20810-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9149)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Data Anonymization and Computation

    1. Front Matter
      Pages 1-1
    2. Mingyi Zhao, Peng Liu, Jorge Lobo
      Pages 19-34
    3. Giovanni Di Crescenzo, Abhrajit Ghosh
      Pages 35-50
  3. Access Control and Authorization

    1. Front Matter
      Pages 51-51
    2. Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
      Pages 69-84
    3. Daniel R. dos Santos, Silvio Ranise, Luca Compagna, Serena E. Ponta
      Pages 85-100
  4. User Privacy

    1. Front Matter
      Pages 101-101
    2. Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael Kahn et al.
      Pages 103-118
    3. Milica Milutinovic, Koen Decroix, Vincent Naessens, Bart De Decker
      Pages 135-150
  5. Authentication and Information Integration

    1. Front Matter
      Pages 151-151
    2. Stephen R. Tate, Roopa Vishwanathan
      Pages 153-169
    3. Joachim Biskup, Cornelia Tadros
      Pages 188-203
  6. Privacy and Trust

    1. Front Matter
      Pages 205-205
    2. Johannes Sänger, Christian Richthammer, André Kremser, Günther Pernul
      Pages 207-214

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymization and computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security; and information flow and inference.

Keywords

Application security Cryptography Database security Fingerprinting Formal methods IPv6 Location privacy Mobility data Multiagent system Network security Privacy Reputation systems Security Security policy Security services Software security Storage security Systems security Theory of security Trust management

Editors and affiliations

  • Pierangela Samarati
    • 1
  1. 1.Università degli Studi di MilanoCremaItaly

Bibliographic information

  • Copyright Information IFIP International Federation for Information Processing 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-20809-1
  • Online ISBN 978-3-319-20810-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349