Advertisement

Data and Applications Security and Privacy XXVI

26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings

  • Nora Cuppens-Boulahia
  • Frédéric Cuppens
  • Joaquin Garcia-Alfaro

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7371)

Table of contents

  1. Front Matter
  2. Invited Paper

    1. Leendert van der Torre
      Pages 1-7
  3. Access Control

  4. Confidentiality and Privacy

    1. Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann
      Pages 56-73
    2. Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini
      Pages 74-89
    3. Gianluca Dini, Pericle Perazzo
      Pages 90-105
  5. Smart Cards Security (Short Papers)

    1. Ravi Singh Pippal, Jaidhar C.D., Shashikala Tapaswi
      Pages 106-113
    2. Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet
      Pages 122-128
  6. Privacy-Preserving Technologies

    1. Robert Nix, Murat Kantarcioglu, Keesook J. Han
      Pages 129-144
    2. Jonathan L. Dautrich, Chinya V. Ravishankar
      Pages 145-160
    3. Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil Adam, Vijayalakshmi Atluri
      Pages 161-176
  7. Data Management

    1. Simon N. Foley, William M. Fitzgerald
      Pages 177-192
    2. Rami Sharon, Ehud Gudes
      Pages 193-206
    3. Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run
      Pages 207-222
  8. Intrusion and Malware

    1. Smitha Sundareswaran, Anna Cinzia Squicciarini
      Pages 223-238
    2. Abhijith Shastry, Murat Kantarcioglu, Yan Zhou, Bhavani Thuraisingham
      Pages 239-254
  9. Probabilistic Attacks and Protection (Short Papers)

    1. Hamed Saljooghinejad, Wilson Naik Bhukya
      Pages 255-262
    2. Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili
      Pages 263-273
    3. Sébastien Gambs, Ahmed Gmati, Michel Hurfin
      Pages 274-281
  10. Cloud Computing

    1. Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga
      Pages 282-297
    2. Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing
      Pages 298-313
    3. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga
      Pages 314-329
  11. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012.

The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing.

Keywords

authorization and authentication data mining information systems security threats vulnerability

Editors and affiliations

  • Nora Cuppens-Boulahia
    • 1
  • Frédéric Cuppens
    • 1
  • Joaquin Garcia-Alfaro
    • 1
  1. 1.Télécom BretagneCesson Sévigné CedexFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-31540-4
  • Copyright Information IFIP International Federation for Information Processing 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-31539-8
  • Online ISBN 978-3-642-31540-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site