Search dblp for Publications

export results for "toc:db/conf/dbsec/dbsec2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/dbsec/AshokM14,
  author       = {Vikas G. Ashok and
                  Ravi Mukkamala},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {A Scalable and Efficient Privacy Preserving Global Itemset Support
                  Approximation Using Bloom Filters},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {382--389},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_26},
  doi          = {10.1007/978-3-662-43936-4\_26},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AshokM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BaroutiAAD14,
  author       = {Samira Barouti and
                  Feras Aljumah and
                  Dima Alhadidi and
                  Mourad Debbabi},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Secure and Privacy-Preserving Querying of Personal Health Records
                  in the Cloud},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_6},
  doi          = {10.1007/978-3-662-43936-4\_6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BaroutiAAD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BkakriaCCG14,
  author       = {Anis Bkakria and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  David Gross{-}Amblard},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Specification and Deployment of Integrated Security Policies for Outsourced
                  Data},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_2},
  doi          = {10.1007/978-3-662-43936-4\_2},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BkakriaCCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChengPS14,
  author       = {Yuan Cheng and
                  Jaehong Park and
                  Ravi S. Sandhu},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Attribute-Aware Relationship-Based Access Control for Online Social
                  Networks},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {292--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_19},
  doi          = {10.1007/978-3-662-43936-4\_19},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChengPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CostanteHPEP14,
  author       = {Elisa Costante and
                  Jerry den Hartog and
                  Milan Petkovic and
                  Sandro Etalle and
                  Mykola Pechenizkiy},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Hunting the Unknown - White-Box Database Leakage Detection},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {243--259},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_16},
  doi          = {10.1007/978-3-662-43936-4\_16},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CostanteHPEP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CrescenzoCMP14,
  author       = {Giovanni Di Crescenzo and
                  Debra L. Cook and
                  Allen McIntosh and
                  Euthimios Panagos},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Practical Private Information Retrieval from a Time-Varying, Multi-attribute,
                  and Multiple-Occurrence Database},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {339--355},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_22},
  doi          = {10.1007/978-3-662-43936-4\_22},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CrescenzoCMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CrescenzoS14,
  author       = {Giovanni Di Crescenzo and
                  David Shallcross},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {On Minimizing the Size of Encrypted Databases},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {364--372},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_24},
  doi          = {10.1007/978-3-662-43936-4\_24},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CrescenzoS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DavidsonGT14,
  author       = {Michal Davidson and
                  Ehud Gudes and
                  Tamir Tassa},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Efficient and Enhanced Solutions for Content Sharing in {DRM} Systems},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {373--381},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_25},
  doi          = {10.1007/978-3-662-43936-4\_25},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/DavidsonGT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DerlerHS14,
  author       = {David Derler and
                  Christian Hanser and
                  Daniel Slamanig},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous
                  Credentials},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {49--65},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_4},
  doi          = {10.1007/978-3-662-43936-4\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/DerlerHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HanHA14,
  author       = {Wonkyu Han and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {{LPM:} Layered Policy Management for Software-Defined Networks},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {356--363},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_23},
  doi          = {10.1007/978-3-662-43936-4\_23},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HanHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HongVLW14,
  author       = {Yuan Hong and
                  Jaideep Vaidya and
                  Haibing Lu and
                  Lingyu Wang},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Collaboratively Solving the Traveling Salesman Problem with Limited
                  Disclosure},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_12},
  doi          = {10.1007/978-3-662-43936-4\_12},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HongVLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HuangZE14,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Robert F. Erbacher},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Toward Software Diversity in Heterogeneous Networked Systems},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_8},
  doi          = {10.1007/978-3-662-43936-4\_8},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HuangZE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KhanZHH14,
  author       = {Rasib Khan and
                  Shams Zawoad and
                  Md Munirul Haque and
                  Ragib Hasan},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {'Who, When, and Where?' Location Proof Assertion for Mobile Devices},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_10},
  doi          = {10.1007/978-3-662-43936-4\_10},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/KhanZHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LeKJ14,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Consistent Query Plan Generation in Secure Cooperative Data Access},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {227--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_15},
  doi          = {10.1007/978-3-662-43936-4\_15},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LeKJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LuHYFD14,
  author       = {Haibing Lu and
                  Yuan Hong and
                  Yanjiang Yang and
                  Yi Fang and
                  Lian Duan},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Dynamic Workflow Adjustment with Security Constraints},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {211--226},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_14},
  doi          = {10.1007/978-3-662-43936-4\_14},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LuHYFD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MehreganF14,
  author       = {Pooya Mehregan and
                  Philip W. L. Fong},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Design Patterns for Multiple Stakeholders in Social Computing},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {163--178},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_11},
  doi          = {10.1007/978-3-662-43936-4\_11},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MehreganF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MoatazCCRR14,
  author       = {Tarik Moataz and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {{ELITE:} zEro Links Identity managemenT systEm},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_13},
  doi          = {10.1007/978-3-662-43936-4\_13},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MoatazCCRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MoatazJRCCR14,
  author       = {Tarik Moataz and
                  Benjamin Justus and
                  Indrakshi Ray and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Indrajit Ray},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Privacy-Preserving Multiple Keyword Search on Outsourced Data in the
                  Clouds},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_5},
  doi          = {10.1007/978-3-662-43936-4\_5},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MoatazJRCCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RaniseT14,
  author       = {Silvio Ranise and
                  Anh Tuan Truong},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Incremental Analysis of Evolving Administrative Role Based Access
                  Control Policies},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {260--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_17},
  doi          = {10.1007/978-3-662-43936-4\_17},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RaniseT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SanamradBKV14,
  author       = {Tahmineh Sanamrad and
                  Lucas Braun and
                  Donald Kossmann and
                  Ramarathnam Venkatesan},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Randomly Partitioned Encryption for Cloud Databases},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {307--323},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_20},
  doi          = {10.1007/978-3-662-43936-4\_20},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/SanamradBKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SolomonSX14,
  author       = {Michael G. Solomon and
                  Vaidy S. Sunderam and
                  Li Xiong},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Towards Secure Cloud Database with Fine-Grained Access Control},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_21},
  doi          = {10.1007/978-3-662-43936-4\_21},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/SolomonSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VavilisPZ14,
  author       = {Sokratis Vavilis and
                  Milan Petkovic and
                  Nicola Zannone},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Data Leakage Quantification},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_7},
  doi          = {10.1007/978-3-662-43936-4\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VavilisPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VimercatiFJPS14,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Optimizing Integrity Checks for Join Queries in the Cloud},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_3},
  doi          = {10.1007/978-3-662-43936-4\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VimercatiFJPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WeiY14,
  author       = {Wei Wei and
                  Ting Yu},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Integrity Assurance for Outsourced Databases without {DBMS} Modification},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_1},
  doi          = {10.1007/978-3-662-43936-4\_1},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/WeiY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/XuS14,
  author       = {Zhongyuan Xu and
                  Scott D. Stoller},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Mining Attribute-Based Access Control Policies from Logs},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {276--291},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_18},
  doi          = {10.1007/978-3-662-43936-4\_18},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/XuS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhauniarovichGCSM14,
  author       = {Yury Zhauniarovich and
                  Olga Gadyatskaya and
                  Bruno Crispo and
                  Francesco La Spina and
                  Ermanno Moser},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {FSquaDRA: Fast Detection of Repackaged Applications},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_9},
  doi          = {10.1007/978-3-662-43936-4\_9},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhauniarovichGCSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2014,
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4},
  doi          = {10.1007/978-3-662-43936-4},
  isbn         = {978-3-662-43935-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics