Data and Applications Security and Privacy XXIV

24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

  • Sara Foresti
  • Sushil Jajodia
Conference proceedings DBSec 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6166)

Table of contents

  1. Front Matter
  2. Query and Data Privacy

    1. Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
      Pages 1-16
    2. Steve Barker, Valerio Genovese
      Pages 17-32
    3. Zutao Zhu, Wenliang Du
      Pages 33-48
  3. Data Protection

    1. Marina Blanton, Mehrdad Aliasgari
      Pages 49-64
    2. Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu
      Pages 65-80
    3. Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell Whitley
      Pages 81-96
  4. Access Control

    1. Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu
      Pages 97-112
    2. Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
      Pages 113-129
    3. Jason Crampton, Rosli Daud, Keith M. Martin
      Pages 130-145
  5. Data Confidentiality and Query Verification

    1. Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci
      Pages 146-161
    2. Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner
      Pages 162-176
    3. Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco
      Pages 177-192
  6. Policy Definition and Enforcement

    1. JeeHyun Hwang, Tao Xie, Vincent Hu, Mine Altunay
      Pages 193-208
    2. Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham
      Pages 209-224
    3. Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin
      Pages 225-240
  7. Trust and Identity Management

    1. Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray
      Pages 241-256
    2. Aarthi Nagarajan, Vijay Varadharajan
      Pages 257-272
    3. Jan Zibuschka, Matthias Herbert, Heiko Roßnagel
      Pages 273-286
  8. Short Papers

    1. Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene-Ayachi
      Pages 287-294
    2. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde
      Pages 303-310
    3. Amril Syalim, Takashi Nishide, Kouichi Sakurai
      Pages 311-318
    4. Yu Chen, Hyun Sung Kim, Jianbin Hu, Zhong Chen
      Pages 319-326
    5. Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker
      Pages 327-334
    6. Kun Peng, Feng Bao
      Pages 350-357
    7. Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar
      Pages 366-373
  9. Back Matter

About these proceedings


This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management.


Protection RFID access control anonymity authentication automata control database management modelling online performance performance evaluation privacy verification

Editors and affiliations

  • Sara Foresti
    • 1
  • Sushil Jajodia
    • 2
  1. 1.DTI – Università degli Studi di MilanoCremaItaly
  2. 2.CSIS – George Mason UniversityFairfaxUSA

Bibliographic information

  • DOI
  • Copyright Information IFIP International Federation for Information Processing 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-13738-9
  • Online ISBN 978-3-642-13739-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site