Search dblp for Publications

export results for "toc:db/conf/dbsec/dbsec2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dbsec/AutrelCC09,
  author       = {Fabien Autrel and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Reaction Policy Model Based on Dynamic Organizations and Threat Context},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_4},
  doi          = {10.1007/978-3-642-03007-9\_4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AutrelCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BerheDA09,
  author       = {Solomon Berhe and
                  Steven A. Demurjian and
                  Thomas Agresta},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Emerging Trends in Health Care Delivery: Towards Collaborative Security
                  for {NIST} {RBAC}},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {283--290},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_19},
  doi          = {10.1007/978-3-642-03007-9\_19},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BerheDA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BiskupSW09,
  author       = {Joachim Biskup and
                  Jens Seiler and
                  Torben Weibert},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Controlled Query Evaluation and Inference-Free View Updates},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_1},
  doi          = {10.1007/978-3-642-03007-9\_1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BiskupSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BounaC09,
  author       = {Bechara al Bouna and
                  Richard Chbeir},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Detecting Inference Channels in Private Multimedia Data via Social
                  Networks},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {208--224},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_14},
  doi          = {10.1007/978-3-642-03007-9\_14},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BounaC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CirianiVFJPS09,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Enforcing Confidentiality Constraints on Sensitive Databases with
                  Lightweight Trusted Clients},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_15},
  doi          = {10.1007/978-3-642-03007-9\_15},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/CirianiVFJPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FoleyF09,
  author       = {Simon N. Foley and
                  William M. Fitzgerald},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {An Approach to Security Policy Configuration Using Semantic Threat
                  Graphs},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_3},
  doi          = {10.1007/978-3-642-03007-9\_3},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/FoleyF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Frikken09,
  author       = {Keith B. Frikken},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Practical Private {DNA} String Searching and Matching through Efficient
                  Oblivious Automata Evaluation},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_6},
  doi          = {10.1007/978-3-642-03007-9\_6},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Frikken09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/GudesGG09,
  author       = {Ehud Gudes and
                  Nurit Gal{-}Oz and
                  Alon Grubshtein},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Methods for Computing Trust and Reputation While Preserving Privacy},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {291--298},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_20},
  doi          = {10.1007/978-3-642-03007-9\_20},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/GudesGG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JurczykX09,
  author       = {Pawel Jurczyk and
                  Li Xiong},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Distributed Anonymization: Achieving Privacy for Both Data Subjects
                  and Data Providers},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {191--207},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_13},
  doi          = {10.1007/978-3-642-03007-9\_13},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JurczykX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LayouniVSDV09,
  author       = {Mohamed Layouni and
                  Kristof Verslype and
                  Mehmet Tahir Sandikkaya and
                  Bart De Decker and
                  Hans Vangheluwe},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Privacy-Preserving Telemonitoring for eHealth},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_7},
  doi          = {10.1007/978-3-642-03007-9\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LayouniVSDV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/NugmanovPH09,
  author       = {Yermek Nugmanov and
                  Brajendra Panda and
                  Yi Hu},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Analysis of Data Dependency Based Intrusion Detection System},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_8},
  doi          = {10.1007/978-3-642-03007-9\_8},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/NugmanovPH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/OlsonGCW09,
  author       = {Lars E. Olson and
                  Carl A. Gunter and
                  William R. Cook and
                  Marianne Winslett},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Implementing Reflective Access Control in {SQL}},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_2},
  doi          = {10.1007/978-3-642-03007-9\_2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/OlsonGCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Ould-SlimaneMA09,
  author       = {Hakima Ould{-}Slimane and
                  Mohamed Mejri and
                  Kamel Adi},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Using Edit Automata for Rewriting-Based Security Enforcement},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_12},
  doi          = {10.1007/978-3-642-03007-9\_12},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Ould-SlimaneMA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/PietersT09,
  author       = {Wolter Pieters and
                  Qiang Tang},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Data Is Key: Introducing the Data-Based Access Control Paradigm},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {240--251},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_16},
  doi          = {10.1007/978-3-642-03007-9\_16},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/PietersT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SarrouyTJ09,
  author       = {Olivier Sarrouy and
                  Eric Totel and
                  Bernard Jouga},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Building an Application Data Behavior Model for Intrusion Detection},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {299--306},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_21},
  doi          = {10.1007/978-3-642-03007-9\_21},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/SarrouyTJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ScalavinoGL09,
  author       = {Enrico Scalavino and
                  Vaibhav Gowadia and
                  Emil C. Lupu},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {{PAES:} Policy-Based Authority Evaluation Scheme},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {268--282},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_18},
  doi          = {10.1007/978-3-642-03007-9\_18},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ScalavinoGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ShinA09,
  author       = {Heechang Shin and
                  Vijayalakshmi Atluri},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Spatiotemporal Access Control Enforcement under Uncertain Location
                  Estimates},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_11},
  doi          = {10.1007/978-3-642-03007-9\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ShinA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SturmHS09,
  author       = {Christoph Sturm and
                  Ela Hunt and
                  Marc H. Scholl},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Distributed Privilege Enforcement in {PACS}},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {142--158},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_10},
  doi          = {10.1007/978-3-642-03007-9\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/SturmHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/TateV09,
  author       = {Stephen R. Tate and
                  Roopa Vishwanathan},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange
                  Protocols Using Trusted Computing Technology},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_17},
  doi          = {10.1007/978-3-642-03007-9\_17},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/TateV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ToahchoodeeARR09,
  author       = {Manachai Toahchoodee and
                  Ramadan Abdunabi and
                  Indrakshi Ray and
                  Indrajit Ray},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {A Trust-Based Access Control Model for Pervasive Computing Applications},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {307--314},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_22},
  doi          = {10.1007/978-3-642-03007-9\_22},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ToahchoodeeARR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/XuZA09,
  author       = {Wenjuan Xu and
                  Xinwen Zhang and
                  Gail{-}Joon Ahn},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Towards System Integrity Protection with Graph-Based Policy Analysis},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_5},
  doi          = {10.1007/978-3-642-03007-9\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/XuZA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/YangZ09,
  author       = {Xiaofeng Yang and
                  Mohammad Zulkernine},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Secure Method Calls by Instrumenting Bytecode with Aspects},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_9},
  doi          = {10.1007/978-3-642-03007-9\_9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/YangZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2009,
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9},
  doi          = {10.1007/978-3-642-03007-9},
  isbn         = {978-3-642-03006-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics