default search action
16. ESORICS 2011: Leuven, Belgium - DPM/SETOP
- Joaquín García-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati:
Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7122, Springer 2012, ISBN 978-3-642-28878-4
Keynote Address
- Gildas Avoine:
Privacy Challenges in RFID. 1-8
Data Privacy Management
- Alexandros Karakasidis, Vassilios S. Verykios, Peter Christen:
Fake Injection Strategies for Private Phonetic Matching. 9-24 - Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio, Luca Wiegand:
A Design Phase for Data Sharing Agreements. 25-41 - Javier Parra-Arnau, David Rebollo-Monedero, Jordi Forné:
A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings. 42-57 - Christian A. Duncan, Vir V. Phoha:
On the Complexity of Aggregating Information for Authentication and Profiling. 58-71 - Jaydip Sen:
Secure and Privacy-Aware Searching in Peer-to-Peer Networks. 72-89 - Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi, Hamid Behnam:
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol. 90-103 - Joachim Biskup, Cornelia Tadros:
Inference-Proof View Update Transactions with Minimal Refusals. 104-121 - Alexander Pretschner, Enrico Lovat, Matthias Büchler:
Representation-Independent Data Usage Control. 122-140 - Aimilia Tasidou, Pavlos S. Efraimidis:
Using Personal Portfolios to Manage Customer Data. 141-154
Autonomous and Spontaneous Security
- Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, Gouenou Coatrieux, Ana R. Cavalli, Amel Mammar:
Using Requirements Engineering in an Automatic Security Policy Derivation Process. 155-172 - Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch:
Web Services Verification and Prudent Implementation. 173-189 - Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana de Oliveira, Hervé Grall, Mario Südholt:
Evolving Security Requirements in Multi-layered Service-Oriented-Architectures. 190-205 - Leanid Krautsevich, Fabio Martinelli, Charles Morisset, Artsiom Yautsiukhin:
Risk-Based Auto-delegation for Probabilistic Availability. 206-220 - Carles Martínez-García, Guillermo Navarro-Arribas, Joan Borrell:
Intra-role Progression in RBAC: An RPG-Like Access Control Scheme. 221-234 - Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani:
Distributed Orchestration of Web Services under Security Constraints. 235-252 - Julio César Hernández Castro, Pedro Peris-Lopez, Jean-Philippe Aumasson:
On the Key Schedule Strength of PRESENT. 253-263 - Enric Pujol-Gil, Nikolaos Chatzis:
A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines. 264-279 - Yulong Fu, Ousmane Koné:
Network Securing against Threatening Requests. 280-294
Short Papers
- Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani, Iakovos S. Venieris:
A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring. 295-302 - Helge Janicke, Mohamed Sarrab, Hamza Aldabbas:
Controlling Data Dissemination. 303-309 - Christine Hennebert, Vincent Berg:
A Framework of Deployment Strategy for Hierarchical WSN Security Management. 310-318
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.