


default search action
CODASPY 2012: San Antonio, TX, USA
- Elisa Bertino, Ravi S. Sandhu:

Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012. ACM 2012, ISBN 978-1-4503-1091-8
Database and storage security
- Qingji Zheng, Shouhuai Xu:

Secure and efficient proof of storage with deduplication. 1-12 - Michael T. Goodrich

, Michael Mitzenmacher, Olga Ohrimenko
, Roberto Tamassia:
Practical oblivious storage. 13-24 - Xiaowei Li, Wei Yan, Yuan Xue:

SENTINEL: securing database from logic flaws in web applications. 25-36
Security and privacy for social computing
- Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo

, Peng Liu:
Stalking online: on user privacy in social networks. 37-48 - Xihui Chen, Jun Pang:

Measuring query privacy in location-based services. 49-60 - Suhendry Effendy, Roland H. C. Yap, Felix Halim:

Revisiting link privacy in social networks. 61-70
Access control enforcement
- Ninghui Li, Haining Chen, Elisa Bertino:

On practical specification and enforcement of obligations. 71-82 - Prachi Kumari, Alexander Pretschner:

Deriving implementation-level policies for usage control enforcement. 83-94 - Lujo Bauer

, Yuan Liang, Michael K. Reiter, Chad Spensky:
Discovering access-control misconfigurations: new approaches and evaluation methodologies. 95-104 - Yan Zhu

, Hongxin Hu, Gail-Joon Ahn
, Mengyang Yu, Hong-Jia Zhao:
Comparison-based encryption for fine-grained access control in clouds. 105-116
Short papers session 1
- Glenn Bruns, Philip W. L. Fong, Ida Sri Rejeki Siahaan

, Michael Huth:
Relationship-based access control: its expression and enforcement through hybrid logic. 117-124 - Xi Gong, Ting Yu, Adam J. Lee

:
Bounding trust in reputation systems with incomplete information. 125-132 - Murillo Pontual, Andreas Gampe, Omar Chowdhury, Bazoumana Kone, Md. Shamim Ashik, William H. Winsborough:

The privacy in the time of the internet: secrecy vs transparency. 133-140 - Vincent Toubiana, Vincent Verdot, Benoit Christophe:

Cookie-based privacy issues on google services. 141-148 - Wanying Zhao, Jianwei Niu, William H. Winsborough:

Refinement-based design of a group-centric secure information sharing model. 149-156
Novel techniques for access control
- Ian M. Molloy, Luke Dickens

, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo:
Risk-based security decisions under uncertainty. 157-168 - Fabio Martinelli, Charles Morisset:

Quantitative access control with partially-observable Markov decision processes. 169-180 - Nino Vincenzo Verde, Jaideep Vaidya, Vijay Atluri, Alessandro Colantonio:

Role engineering: from theory to practice. 181-192
Novel applications of privacy techniques
- Wen Ming Liu, Lingyu Wang:

Privacy streamliner: a two-stage approach to improving algorithm efficiency. 193-204 - Martin Kost, Johann Christoph Freytag:

Privacy analysis using ontologies. 205-216 - Yuxin Chen, Bo Luo

:
S2A: secure smart household appliances. 217-228 - Musheer Ahmed, Mustaque Ahamad:

Protecting health information on mobile devices. 229-240
Short papers session 2
- Alessandro Armando, Silvio Ranise, Fatih Turkmen

, Bruno Crispo:
Efficient run-time solving of RBAC user authorization queries: pushing the envelope. 241-248 - Konstantine Arkoudas, Akshay Vashist:

A model-theoretic approach to data anonymity and inference control. 249-256 - Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin Wu, Yonggang Wen:

Towards end-to-end secure content storage and delivery with public cloud. 257-266 - Jie Shi, Darren Sim, Yingjiu Li, Robert Huijie Deng

:
SecDS: a secure EPC discovery service system in EPCglobal network. 267-274 - Hussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura:

Identifying native applications with high assurance. 275-282
Novel techniques for data security and privacy
- Mina Askari, Reihaneh Safavi-Naini, Ken Barker:

An information theoretic privacy and utility measure for data sanitization mechanisms. 283-294 - Kalpana Gondi, Prithvi Bisht, Praveen Venkatachari, A. Prasad Sistla, V. N. Venkatakrishnan:

SWIPE: eager erasure of sensitive data in large scale systems software. 295-306 - Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:

Leakage-free redactable signatures. 307-316 - Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning:

Detecting repackaged smartphone applications in third-party android marketplaces. 317-326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














