%0 Generic
%T Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings
%A Samarati, Pierangela
%I Springer
%@ 9783319208107
%K Computer Communication Networks
%K Information Systems
%K Computer Science
%K Computer science
%K Management information systems.
%K Computer security.
%K Computer communication systems.
%K Data protection
%K Database management
%K Application software.
%K Electronic data processing
%K Computer networks .
%K Konferenzschrift
%K Datensicherung
%K Zugriffskontrolle
%K Abfrage
%K Privatsphäre
%K Fairfax, Va.
%D 2015
%X Literaturangaben
%X MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduceTowards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data.
%C Springer
%C Cham [u.a.]
%U http://slubdd.de/katalog?TN_libero_mab2
Download citation