Accepted Papers

DBSec’14 Best Papers:

Best Paper Award:

Optimizing Integrity Checks for Join Queries in the Cloud
Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati.
Università degli Studi di Milano, George Mason University, Università di Bergamo.

scheduled: Mo 11:00 – 12:30 Paper session 1: Outsourced Data

Best Student Paper Award:

Data Leakage Quantification
Sokratis Vavilis, Milan Petkovic and Nicola Zannone.
Eindhoven University of Technology, Philips Research Europe.

schelduled: Mo 13:30 – 15:30 Paper session 2: Privacy I

DBSec’14 Accepted Papers:

Attribute-aware Relationship-based Access Control for Online Social Networks
Yuan Cheng, Jaehong Park and Ravi Sandhu.
University of Texas at San Antonio.

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure
Yuan Hong, Jaideep Vaidya, Haibing Lu and Lingyu Wang.
SUNY-Albany, Rutgers University, Santa Clara University, Concordia University.

Consistent Query Plan Generation in Secure Cooperative Data Access
Meixing Le, Krishna Kant and Sushil Jajodia.
George Mason University.

Data Leakage Quantification
Sokratis Vavilis, Milan Petkovic and Nicola Zannone.
Eindhoven University of Technology, Philips Research Europe.

Design Patterns for Multiple Stakeholders in Social Computing
Pooya Mehregan and Philip W. L. Fong.
University of Calgary.

Dynamic Workflow Adjustment With Security Constraints
Haibing Lu, Yuan Hong, Yanjiang Yang, Yi Fang and Lian Duan.
Santa Clara University, University at Albany, I2R Singapore, New Jersey Institute of Technology.

ELITE: zEro Links Identity managemenT systEm
Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray and Indrakshi Ray.
Colorado State University, Télécom Bretagne.

FSquaDRA: Fast Detection of Repackaged Applications
Yury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo, Francesco La Spina and Ermanno Moser.
University of Trento.

Hunting the Unknown – White-Box Database Leakage Detection
Elisa Costante, Jerry Den Hartog, Milan Petkovic, Etalle Sandro and Mykola Pechenizkiy.
Eindhoven University of Technology, Philips Research Europe.

Incremental Analysis of Evolving Administrative Role Based Access Control Policies
Silvio Ranise and Anh Truong.
FBK-Irst., Fondazione Bruno Kessler, Trento.

Integrity Assurance for Outsourced Databases without DBMS Modification
Wei Wei and Ting Yu.
North Carolina State University.

Mining Attribute-Based Access Control Policies from Logs
Zhongyuan Xu and Scott Stoller.
Stony Brook University.

Optimizing Integrity Checks for Join Queries in the Cloud
Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati.
Università degli Studi di Milano, George Mason University, Università di Bergamo.

Practical Private Information Retrieval from a Time-Varying, Multi-Attribute, and Multiple-Occurrence Database
Giovanni Di Crescenzo , Debra Cook, Allen McIntosh and Euthimios Panagos.
Applied Communication Sciences.

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds
Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens and Indrajit Ray.
Colorado State University, Télécom Bretagne.

Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
David Derler, Christian Hanser and Daniel Slamanig.
Graz University of Technology (TUG).

Randomly Partitioned Encryption for Cloud Databases
Tahmineh Sanamrad, Lucas Braun, Donald Kossmann and Ramarathnam Venkatesan.
ETH Zurich, Microsoft Research.

Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud
Samira Barouti, Feras Aljumah, Dima Alhadidi and Mourad Debbabi.
Concordia University.

Specification and Deployment of Integrated Security Policies for Outsourced Data
Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia and David Gross-Amblard.
Télécom Bretagne, IRISA.

Towards Secure Cloud Database with Fine-Grained Access Control
Michael Solomon, Vaidy Sunderam and Li Xiong.
Emory University.

Toward Software Diversity in Heterogeneous Networked Systems
Chu Huang, Sencun Zhu and Robert Erbacher.
Penn State University, U.S. Army Research Laboratory(ARL).

`Who, When, and Where?‘ Location Proof Assertion for Mobile Devices
Rasib Khan, Shams Zawoad, Md Munirul Haque and Ragib Hasan.
University of Alabama at Birmingham.

DBSec’14 Accepted Short Papers

A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation using Bloom Filters
Vikas Ashok and Ravi Mukkamala.
SUNY Stony Brook, Old Dominion University.

Efficient and Enhanced Solutions for Content Sharing in DRM Systems
Michal Davidson, Ehud Gudes and Tamir Tassa.
The Open University, Ben-Gurion University.

On Minimizing the Size of Encrypted Databases
Giovanni Di Crescenzo and David Shallcross.
Applied Communication Sciences.

LPM: Layered Policy Management for Software-Defined Networks
Wonkyu Han, Hongxin Hu and Gail-Joon Ahn.
Arizona State University, Clemson University.