Data and Applications Security and Privacy XXVII

27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings

  • Lingyu Wang
  • Basit Shafiq

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7964)

Table of contents

  1. Front Matter
  2. Privacy I

    1. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
      Pages 1-16
  3. Access Control

    1. Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
      Pages 65-80
    2. Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar
      Pages 81-96
  4. Cloud Computing

    1. Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France
      Pages 97-112
    2. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing
      Pages 113-127
  5. Privacy II

    1. Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
      Pages 128-144
    2. Bechara Al Bouna, Chris Clifton, Qutaibah Malluhi
      Pages 164-178
  6. Data Outsourcing

    1. Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer et al.
      Pages 195-210
    2. Rohit Jain, Sunil Prabhakar
      Pages 211-225
  7. Mobile Computing

    1. Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala
      Pages 226-241
    2. Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray, Keesook J. Han
      Pages 242-257
  8. Short Papers

    1. Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang
      Pages 258-265
    2. Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen
      Pages 266-273
    3. Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere
      Pages 274-281

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.

Keywords

access control data mining malware outsourcing traffic monitoring

Editors and affiliations

  • Lingyu Wang
    • 1
  • Basit Shafiq
    • 2
  1. 1.Concordia Institute for Information Systems Engineering (CIISE)Concordia UniversityMontrealCanada
  2. 2.Department of Computer Science, DHA, Lahore CanttLahore University of Management Sciences (LUMS)LahorePakistan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-39256-6
  • Copyright Information IFIP International Federation for Information Processing 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-39255-9
  • Online ISBN 978-3-642-39256-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book