`Who, When, and Where?' Location Proof Assertion for Mobile Devices (English)
- New search for: Khan, R.
- New search for: Zawoad, S.
- New search for: Haque, M.M.
- New search for: Hasan, R.
- New search for: International Federation for Information Processing
- New search for: Khan, R.
- New search for: Zawoad, S.
- New search for: Haque, M.M.
- New search for: Hasan, R.
- New search for: Atluri, Vijay
- New search for: Pernul, Gunther
- New search for: International Federation for Information Processing
In:
Data and applications security and privacy XXVIII: 28th annual IFIP WG 11.3 working conference, DBSec 2014
8566
;
146-162
;
2014
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:`Who, When, and Where?' Location Proof Assertion for Mobile Devices
-
Contributors:Khan, R. ( author ) / Zawoad, S. ( author ) / Haque, M.M. ( author ) / Hasan, R. ( author ) / Atluri, Vijay / Pernul, Gunther / International Federation for Information Processing
-
Conference:28th, Data and applications security and privacy XXVIII: 28th annual IFIP WG 11.3 working conference, DBSec 2014 ; 2014 ; Vienna, Austria
-
Published in:Data and applications security and privacy XXVIII: 28th annual IFIP WG 11.3 working conference, DBSec 2014 , 8566 ; 146-162LECTURE NOTES IN COMPUTER SCIENCE , 8566 ; 146-162
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2014-01-01
-
Size:17 pages
-
Remarks:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Integrity Assurance for Outsourced Databases without DBMS ModificationWei, W. / Yu, T. / International Federation for Information Processing et al. | 2014
- 17
-
Specification and Deployment of Integrated Security Policies for Outsourced DataBkakria, A. / Cuppens, F. / Cuppens-Boulahia, N. / Gross-Amblard, D. / International Federation for Information Processing et al. | 2014
- 33
-
Optimizing Integrity Checks for Join Queries in the CloudDe Capitani di Vimercati, S. / Foresti, S. / Jajodia, S. / Paraboschi, S. / Samarati, P. / International Federation for Information Processing et al. | 2014
- 49
-
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous CredentialsDerler, D. / Hanser, C. / Slamanig, D. / International Federation for Information Processing et al. | 2014
- 66
-
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the CloudsMoataz, T. / Justus, B. / Ray, I. / Cuppens-Boulahia, N. / Cuppens, F. / International Federation for Information Processing et al. | 2014
- 82
-
Secure and Privacy-Preserving Querying of Personal Health Records in the CloudBarouti, S. / Aljumah, F. / Alhadidi, D. / Debbabi, M. / International Federation for Information Processing et al. | 2014
- 98
-
Data Leakage QuantificationVavilis, S. / Petkovic, M. / Zannone, N. / International Federation for Information Processing et al. | 2014
- 114
-
Toward Software Diversity in Heterogeneous Networked SystemsHuang, C. / Zhu, S. / Erbacher, R. / International Federation for Information Processing et al. | 2014
- 130
-
FSquaDRA: Fast Detection of Repackaged ApplicationsZhauniarovich, Y. / Gadyatskaya, O. / Crispo, B. / La Spina, F. / Moser, E. / International Federation for Information Processing et al. | 2014
- 146
-
`Who, When, and Where?' Location Proof Assertion for Mobile DevicesKhan, R. / Zawoad, S. / Haque, M.M. / Hasan, R. / International Federation for Information Processing et al. | 2014
- 163
-
Design Patterns for Multiple Stakeholders in Social ComputingMehregan, P. / Fong, P.W.L. / International Federation for Information Processing et al. | 2014
- 179
-
Collaboratively Solving the Traveling Salesman Problem with Limited DisclosureHong, Y. / Vaidya, J. / Lu, H. / Wang, L. / International Federation for Information Processing et al. | 2014
- 195
-
ELITE: zEro Links Identity managemenT systEmMoataz, T. / Cuppens-Boulahia, N. / Cuppens, F. / Ray, I. / International Federation for Information Processing et al. | 2014
- 211
-
Dynamic Workflow Adjustment with Security ConstraintsLu, H. / Hong, Y. / Yang, Y. / Fang, Y. / Duan, L. / International Federation for Information Processing et al. | 2014
- 227
-
Consistent Query Plan Generation in Secure Cooperative Data AccessLe, M. / Kant, K. / Jajodia, S. / International Federation for Information Processing et al. | 2014
- 243
-
Hunting the Unknown: White-Box Database Leakage DetectionCostante, E. / Hartog, J.d. / Petkovic, M. / Etalle, S. / Pechenizkiy, M. / International Federation for Information Processing et al. | 2014
- 260
-
Incremental Analysis of Evolving Administrative Role Based Access Control PoliciesRanise, S. / Truong, A. / International Federation for Information Processing et al. | 2014
- 276
-
Mining Attribute-Based Access Control Policies from LogsXu, Z. / Stoller, S.D. / International Federation for Information Processing et al. | 2014
- 292
-
Attribute-Aware Relationship-Based Access Control for Online Social NetworksCheng, Y. / Park, J. / Sandhu, R. / International Federation for Information Processing et al. | 2014
- 307
-
Randomly Partitioned Encryption for Cloud DatabasesSanamrad, T. / Braun, L. / Kossmann, D. / Venkatesan, R. / International Federation for Information Processing et al. | 2014
- 324
-
Towards Secure Cloud Database with Fine-Grained Access ControlSolomon, M.G. / Sunderam, V. / Xiong, L. / International Federation for Information Processing et al. | 2014
- 339
-
Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence DatabaseDi Crescenzo, G. / Cook, D. / McIntosh, A. / Panagos, E. / International Federation for Information Processing et al. | 2014
- 356
-
LPM: Layered Policy Management for Software-Defined NetworksHan, W. / Hu, H. / Ahn, G.-J. / International Federation for Information Processing et al. | 2014
- 364
-
On Minimizing the Size of Encrypted DatabasesDi Crescenzo, G. / Shallcross, D. / International Federation for Information Processing et al. | 2014
- 373
-
Efficient and Enhanced Solutions for Content Sharing in DRM SystemsDavidson, M. / Gudes, E. / Tassa, T. / International Federation for Information Processing et al. | 2014
- 382
-
A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom FiltersAshok, V.G. / Mukkamala, R. / International Federation for Information Processing et al. | 2014