Data and applications security and privacy XXIX : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, proceedings /: 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, proceedings. (2015)
- Record Type:
- Book
- Title:
- Data and applications security and privacy XXIX : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, proceedings /: 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, proceedings. (2015)
- Main Title:
- Data and applications security and privacy XXIX : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, proceedings
- Other Titles:
- Data and applications security and privacy 39
DBSec 2015 - Further Information:
- Note: Edited by Pierangela Samarati.
- Editors:
- Samarati, Pierangela
- Other Names:
- Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 29th
- Contents:
- MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints --MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2015
- Extent:
- 1 online resource (xi, 364 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Computer Science
Engineering & Applied Sciences
Computers -- Database Management -- General
Business & Economics -- Information Management
Computers -- Information Technology
Computers -- Hardware -- Network Hardware
Databases
Information architecture
Information retrieval
Network hardware
Computer security
Database management
Information Systems
Computer Communication Networks
Computers -- Security -- General
Computer security
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319208107
3319208101
3319208098
9783319208091 - Related ISBNs:
- 9783319208091
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed July 2, 2015).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.354716
- Ingest File:
- 01_314.xml