Advertisement

Data Privacy Management, Cryptocurrencies and Blockchain Technology

ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings

  • Joaquin Garcia-Alfaro
  • Guillermo Navarro-Arribas
  • Hannes Hartenstein
  • Jordi Herrera-Joancomartí
Conference proceedings DPM 2017, CBT 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10436)

Also part of the Security and Cryptology book sub series (LNSC, volume 10436)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Privacy, Logics, and Computational Models

    1. Front Matter
      Pages 1-1
    2. Florian Kammüller
      Pages 3-18
    3. Olaf Owe, Toktam Ramezanifarkhani
      Pages 19-34
    4. Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser
      Pages 35-52
  3. Privacy and Encrypted Search

    1. Front Matter
      Pages 53-53
    2. Yuuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara
      Pages 55-69
    3. Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
      Pages 70-85
    4. Thaís Bardini Idalino, Dayana Spagnuelo, Jean Everson Martina
      Pages 86-103
  4. Data Privacy, Data Mining, and Applications

    1. Front Matter
      Pages 105-105
    2. Toru Nakamura, Welderufael B. Tesfay, Shinsaku Kiyomoto, Jetzabel Serna
      Pages 107-123
    3. Devriş İşler, Alptekin Küpçü
      Pages 143-162
  5. User Privacy

    1. Front Matter
      Pages 181-181
    2. Paul Wagner, Pascal Birnstill, Erik Krempel, Sebastian Bretthauer, Jürgen Beyerer
      Pages 183-201
    3. Mojtaba Eskandari, Bruno Crispo, Anderson Santana de Oliveira
      Pages 202-218
    4. Sanaz Taheri Boshrooyeh, Alptekin Küpçü
      Pages 219-235
  6. Applied Cryptography and Privacy

    1. Front Matter
      Pages 237-237
    2. Nesrine Kaaniche, Maryline Laurent, Pierre-Olivier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro
      Pages 239-256
    3. James Dyer, Martin Dyer, Jie Xu
      Pages 257-274
    4. Giovanni Di Crescenzo, Brian Coan, Jonathan Kirsch
      Pages 275-294
  7. Consensus and Smart Contracts

    1. Front Matter
      Pages 295-295
    2. Wenting Li, Sébastien Andreina, Jens-Matthias Bohli, Ghassan Karame
      Pages 297-315
    3. Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar Weippl
      Pages 316-333
    4. Patrick McCorry, Ethan Heilman, Andrew Miller
      Pages 334-353
  8. Smart Contracts and Blockchain Identity

    1. Front Matter
      Pages 355-355
    2. Michael Fröwis, Rainer Böhme
      Pages 357-372
    3. Sarah Azouvi, Mustafa Al-Bassam, Sarah Meiklejohn
      Pages 373-389
    4. Daniel Augot, Hervé Chabanne, Thomas Chenevier, William George, Laurent Lambert
      Pages 390-407
  9. Short Papers

    1. Front Matter
      Pages 409-409
    2. Elias Rohrer, Jann-Frederik Laß, Florian Tschorsch
      Pages 411-419
    3. A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Levine
      Pages 420-428
    4. Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen
      Pages 429-436
    5. Björn Tackmann
      Pages 437-444
  10. Back Matter
    Pages 445-446

About these proceedings

Introduction

This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017.
The DPM Workshop received 51 submissions from which 16 full papers were selected for presentation. The papers focus on challenging problems such as translation of high-level buiness goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering. From the CBT Workshop six full papers and four short papers out of 27 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing.

Keywords

authorization cloud computing cryptography and cryptanalysis information security personal data access control cyber-attack dependability frequent pattern mining fully homomorphic encryption privacy and privacy management privacy preservation privacy-preserving protocols pseudonymity, anonymity and untraceability relational database requirements engineering risk security and quantitative aspects security automation trust

Editors and affiliations

  • Joaquin Garcia-Alfaro
    • 1
  • Guillermo Navarro-Arribas
    • 2
  • Hannes Hartenstein
    • 3
  • Jordi Herrera-Joancomartí
    • 4
  1. 1.Télécom SudParisEvryFrance
  2. 2.Department of Information and Communications EngineeringAutonomous University of BarcelonaBellaterraSpain
  3. 3.Karlsruhe Institute of TechnologyKarlsruheGermany
  4. 4.Autonomous University of BarcelonaBellaterraSpain

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-67816-0
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-67815-3
  • Online ISBN 978-3-319-67816-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site