Sciweavers

DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 8 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
DBSEC
2010
111views Database» more  DBSEC 2010»
13 years 9 months ago
Efficient Inference Control for Open Relational Queries
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan...
DBSEC
2010
128views Database» more  DBSEC 2010»
13 years 11 months ago
On the Identification of Property Based Generalizations in Microdata Anonymization
Abstract. Majority of the search algorithms in microdata anonymization restrict themselves to a single privacy property and a single criteria to optimize. The solutions obtained ar...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
DBSEC
2010
113views Database» more  DBSEC 2010»
13 years 11 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese
DBSEC
2010
123views Database» more  DBSEC 2010»
13 years 11 months ago
Evaluating the Risk of Adopting RBAC Roles
We propose a framework to evaluate the risk incurred when managing users and permissions through RBAC. The risk analysis framework does not require roles to be defined, thus making...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
DBSEC
2010
152views Database» more  DBSEC 2010»
14 years 27 days ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
DBSEC
2010
319views Database» more  DBSEC 2010»
14 years 27 days ago
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach
As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, i...
Alex Hai Wang
DBSEC
2010
126views Database» more  DBSEC 2010»
14 years 27 days ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
DBSEC
2010
129views Database» more  DBSEC 2010»
14 years 27 days ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
DBSEC
2010
162views Database» more  DBSEC 2010»
14 years 27 days ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang