Search dblp for Publications

export results for "toc:db/conf/dbsec/dbsec2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dbsec/AlawnehA08,
  author       = {Muntaha Alawneh and
                  Imad M. Abbadi},
  editor       = {Vijay Atluri},
  title        = {Sharing but Protecting Content Against Internal Leakage for Organisations},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {238--253},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_19},
  doi          = {10.1007/978-3-540-70567-3\_19},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AlawnehA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Anderson08,
  author       = {Ross J. Anderson},
  editor       = {Vijay Atluri},
  title        = {Security, Functionality and Scale?},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {64},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_5},
  doi          = {10.1007/978-3-540-70567-3\_5},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Anderson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ArdagnaVGJS08,
  author       = {Claudio Agostino Ardagna and
                  Sabrina De Capitani di Vimercati and
                  Tyrone Grandison and
                  Sushil Jajodia and
                  Pierangela Samarati},
  editor       = {Vijay Atluri},
  title        = {Regulating Exceptions in Healthcare Using Policy Spaces},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {254--267},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_20},
  doi          = {10.1007/978-3-540-70567-3\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ArdagnaVGJS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Barker08,
  author       = {Steve Barker},
  editor       = {Vijay Atluri},
  title        = {Dynamic Meta-level Access Control in {SQL}},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_1},
  doi          = {10.1007/978-3-540-70567-3\_1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Barker08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarkerCCLT08,
  author       = {Steve Barker and
                  David W. Chadwick and
                  Jason Crampton and
                  Emil Lupu and
                  Bhavani Thuraisingham},
  editor       = {Vijay Atluri},
  title        = {Panel Session: What Are the Key Challenges in Distributed Security?},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {219--221},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_17},
  doi          = {10.1007/978-3-540-70567-3\_17},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarkerCCLT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CarminatiF08,
  author       = {Barbara Carminati and
                  Elena Ferrari},
  editor       = {Vijay Atluri},
  title        = {Privacy-Aware Collaborative Access Control in Web-Based Social Networks},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {81--96},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_7},
  doi          = {10.1007/978-3-540-70567-3\_7},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/CarminatiF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DhankharKW08,
  author       = {Vijayant Dhankhar and
                  Saket Kaushik and
                  Duminda Wijesekera},
  editor       = {Vijay Atluri},
  title        = {Securing Workflows with XACML, {RDF} and {BPEL}},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {330--345},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_25},
  doi          = {10.1007/978-3-540-70567-3\_25},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/DhankharKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DongRD08,
  author       = {Changyu Dong and
                  Giovanni Russello and
                  Naranker Dulay},
  editor       = {Vijay Atluri},
  title        = {Shared and Searchable Encrypted Data for Untrusted Servers},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {127--143},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_10},
  doi          = {10.1007/978-3-540-70567-3\_10},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/DongRD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DutaB08,
  author       = {Angela Cristina Duta and
                  Ken Barker},
  editor       = {Vijay Atluri},
  title        = {{P4A:} {A} New Privacy Model for {XML}},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_6},
  doi          = {10.1007/978-3-540-70567-3\_6},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/DutaB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/El-FotouhD08,
  author       = {Mohamed Abo El{-}Fotouh and
                  Klaus Diepold},
  editor       = {Vijay Atluri},
  title        = {The Analysis of Windows Vista Disk Encryption Algorithm},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {113--126},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_9},
  doi          = {10.1007/978-3-540-70567-3\_9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/El-FotouhD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/GoyalGG08,
  author       = {Vikram Goyal and
                  Shyam K. Gupta and
                  Anand Gupta},
  editor       = {Vijay Atluri},
  title        = {A Unified Audit Expression Model for Auditing {SQL} Queries},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_3},
  doi          = {10.1007/978-3-540-70567-3\_3},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/GoyalGG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HannaLFD08,
  author       = {Aiman Hanna and
                  Hai Zhou Ling and
                  Jason Furlong and
                  Mourad Debbabi},
  editor       = {Vijay Atluri},
  title        = {Towards Automation of Testing High-Level Security Properties},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {268--282},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_21},
  doi          = {10.1007/978-3-540-70567-3\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HannaLFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Hernandez-GoyaCDMC08,
  author       = {Candelaria Hern{\'{a}}ndez{-}Goya and
                  Pino Caballero{-}Gil and
                  Oscar Delgado{-}Mohatar and
                  Jezabel Molina{-}Gil and
                  C{\'{a}}ndido Caballero{-}Gil},
  editor       = {Vijay Atluri},
  title        = {Using New Tools for Certificate Repositories Generation in MANETs},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {175--189},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_14},
  doi          = {10.1007/978-3-540-70567-3\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Hernandez-GoyaCDMC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LuHVA08,
  author       = {Haibing Lu and
                  Xiaoyun He and
                  Jaideep Vaidya and
                  Nabil R. Adam},
  editor       = {Vijay Atluri},
  title        = {Secure Construction of Contingency Tables from Distributed Data},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {144--157},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_11},
  doi          = {10.1007/978-3-540-70567-3\_11},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LuHVA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MaT08,
  author       = {Di Ma and
                  Gene Tsudik},
  editor       = {Vijay Atluri},
  title        = {A New Approach to Secure Logging},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {48--63},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_4},
  doi          = {10.1007/978-3-540-70567-3\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/MaT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/NagarajanVHA08,
  author       = {Aarthi Nagarajan and
                  Vijay Varadharajan and
                  Michael Hitchens and
                  Saurabh Arora},
  editor       = {Vijay Atluri},
  title        = {On the Applicability of Trusted Computing in Distributed Authorization
                  Using Web Services},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {222--237},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_18},
  doi          = {10.1007/978-3-540-70567-3\_18},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/NagarajanVHA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayPD08,
  author       = {Indrajit Ray and
                  Nayot Poolsappasit and
                  Rinku Dewri},
  editor       = {Vijay Atluri},
  title        = {An Opinion Model for Evaluating Malicious Activities in Pervasive
                  Computing Systems},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_23},
  doi          = {10.1007/978-3-540-70567-3\_23},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayPD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RoichmanG08,
  author       = {Alex Roichman and
                  Ehud Gudes},
  editor       = {Vijay Atluri},
  title        = {DIWeDa - Detecting Intrusions in Web Databases},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {313--329},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_24},
  doi          = {10.1007/978-3-540-70567-3\_24},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/RoichmanG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Singhal08,
  author       = {Anoop Singhal},
  editor       = {Vijay Atluri},
  title        = {Web Services Security: Techniques and Challenges (Extended Abstract)},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {158},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_12},
  doi          = {10.1007/978-3-540-70567-3\_12},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Singhal08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/TaoTTTY08,
  author       = {Youdong Tao and
                  Yunhai Tong and
                  Shaohua Tan and
                  Shiwei Tang and
                  Dongqing Yang},
  editor       = {Vijay Atluri},
  title        = {Protecting the Publishing Identity in Multiple Tuples},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {205--218},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_16},
  doi          = {10.1007/978-3-540-70567-3\_16},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/TaoTTTY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ToahchoodeeR08,
  author       = {Manachai Toahchoodee and
                  Indrakshi Ray},
  editor       = {Vijay Atluri},
  title        = {On the Formal Analysis of a Spatio-temporal Role-Based Access Control
                  Model},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_2},
  doi          = {10.1007/978-3-540-70567-3\_2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ToahchoodeeR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VerslypeDNNLV08,
  author       = {Kristof Verslype and
                  Bart De Decker and
                  Vincent Naessens and
                  Girma Nigusse and
                  Jorn Lapon and
                  Pieter Verhaeghe},
  editor       = {Vijay Atluri},
  title        = {A Privacy-Preserving Ticketing System},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_8},
  doi          = {10.1007/978-3-540-70567-3\_8},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/VerslypeDNNLV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WalleckLX08,
  author       = {Daryl Walleck and
                  Yingjiu Li and
                  Shouhuai Xu},
  editor       = {Vijay Atluri},
  title        = {Empirical Analysis of Certificate Revocation Lists},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_13},
  doi          = {10.1007/978-3-540-70567-3\_13},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WalleckLX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangILSJ08,
  author       = {Lingyu Wang and
                  Tania Islam and
                  Tao Long and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Vijay Atluri},
  title        = {An Attack Graph-Based Probabilistic Security Metric},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {283--296},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_22},
  doi          = {10.1007/978-3-540-70567-3\_22},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangILSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhangWJB08,
  author       = {Lei Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Alexander Brodsky},
  editor       = {Vijay Atluri},
  title        = {Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {190--204},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_15},
  doi          = {10.1007/978-3-540-70567-3\_15},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhangWJB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2008,
  editor       = {Vijay Atluri},
  title        = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3},
  doi          = {10.1007/978-3-540-70567-3},
  isbn         = {978-3-540-70566-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics