[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2732121guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Revised Selected Papers of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security - Volume 8247
2013 Proceeding
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
September 12 - 13, 2013
ISBN:
978-3-642-54567-2
Published:
12 September 2013

Reflects downloads up to 28 Dec 2024Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Skip Table Of Content Section
SECTION: Keynote Address
Article
Quantifying and Measuring Anonymity

The design of anonymous communication systems is a relatively new field, but the desire to quantify the security these systems offer has been an important topic of research since its beginning. In recent years, anonymous communication systems have ...

SECTION: Data Privacy Management
Article
Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones

The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smart-phones. The goal of the paper is to analyze the demands of today's common theoretical cryptographic constructions used in privacy-...

Article
Practical Packing Method in Somewhat Homomorphic Encryption

Somewhat homomorphic encryption is public key encryption supporting a limited number of both additions and multiplications on encrypted data, which is useful for performing fundamental computations with protecting the data confidentiality. In this paper,...

Article
Collaborative and Privacy-Aware Sensing for Observing Urban Movement Patterns

The information infrastructure that pervades urban environments represents a major opportunity for collecting information about Human mobility. However, this huge potential has been undermined by the overwhelming privacy risks that are associated with ...

Article
Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting

Parallel computing offers the chance of improving the efficiency of Garbled Circuit technique in multi-party computation protocols. We propose two different types of parallelization: fine-grained, based on the parallel evaluation of gates, and coarse ...

Article
Privacy Analysis of a Hidden Friendship Protocol

Friendship relations are a defining property of online social networks. On the one hand, and beyond their cultural interpretation, they sustain access control mechanisms and are privacy-enhancing by limiting the proliferation of personal information. On ...

Article
Anonymous and Transferable Electronic Ticketing Scheme

Electronic tickets demonstrate, without the use of paper, the possession of an authorization or access to a determined service. In this scenario, some security requirements must be accomplished. Moreover, some determined services should guarantee the ...

Article
Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model

We consider the problem of modeling and designing efficient and privacy-preserving publish/subscribe protocols in a distributed model where parties can act as publishers or subscribers or both, and there are no brokers or other types of parties. The ...

Article
Privacy-Preserving Processing of Raw Genomic Data

Geneticists prefer to store patients' aligned, raw genomic data, in addition to their variant calls (compact and summarized form of the raw data), mainly because of the immaturity of bioinformatic algorithms and sequencing platforms. Thus, we propose a ...

Article
Using Search Results to Microaggregate Query Logs Semantically

Query log anonymization has become an important challenge nowadays. A query log contains the search history of the users, as well as the selected results and their position in the ranking. These data are used to provide a personalized re-ranking of ...

Article
Legal Issues About Metadata Data Privacy vs Information Security

For the purposes of our work we use the concept of metadata to implement enterprise digital right management mechanisms in an intelligent document environment. Such metadata allows us to firstly define contextual security rules and secondly to ensure ...

Article
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model

The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-...

Article
Differentially Private Smart Metering with Battery Recharging

The energy industry has recently begun using smart meters to take fine-grained readings of energy usage. These smart meters enable flexible time-of-use billing, forecasting, and demand response, but they also raise serious user privacy concerns. We ...

Article
AppGuard — Fine-Grained Policy Enforcement for Untrusted Android Applications

Android's success makes it a prominent target for malicious software. However, the user has very limited control over security-relevant operations. This work presents AppGuard, a powerful and flexible security system that overcomes these deficiencies. ...

SECTION: Autonomous and Spontaneous Security
Article
Reference Monitors for Security and Interoperability in OAuth 2.0

OAuth 2.0 is a recent IETF standard devoted to providing authorization to clients requiring access to specific resources over HTTP. It has been pointed out that this framework is potentially subject to security issues, as well as difficulties concerning ...

Article
Remote Biometrics for Robust Persistent Authentication

This paper examines the problem of providing a robust non-invasive authentication service for mobile users in a smart environment. We base our work on the persistent authentication model (PAISE), which relies on available sensors to track principals ...

Article
Classifying Android Malware through Subgraph Mining

Current smartphones are based upon the concept of apps, which are lightweight applications that are distributed through on-line marketplaces, such as Google Play (for Android devices). Unfortunately, this market-centric model is affected by several ...

Article
Introducing Probabilities in Contract-Based Approaches for Mobile Application Security

Security for mobile devices is a problem of capital importance, especially due to new threats coming from malicious applications. This has been proved by the increasing interest of the research community on the topic of security on mobile devices. ...

Article
Advanced Detection Tool for PDF Threats

In this paper we introduce an efficient application for malicious PDF detection: ADEPT. With targeted attacks rising over the recent past, exploring a new detection and mitigation paradigm becomes mandatory. The use of malicious PDF files that exploit ...

Article
Enforcing Input Validation through Aspect Oriented Programming

Injection vulnerabilities are still prevalent today, ranking first on OWASP top ten threats to software security. Developers often have trouble to adopt secure coding practices during the software development life cycle, failing to prevent these ...

Article
Lightweight Cryptography for Embedded Systems — A Comparative Analysis

As computing becomes pervasive, embedded systems are deployed in a wide range of domains, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable applications. An integral part of the ...

SECTION: Short Papers
Article
A Simulation of Document Detection Methods and Reducing False Positives for Private Stream Searching
Pages 353–361

Private stream searching is a system of cryptographic methods that provide a search facility while preserving the confidentiality of the search criteria and matching documents. This research analyzes the original documentation detection method of the ...

Article
Dynamic Anonymous Index for Confidential Data

In this paper we introduce a <InlineEquation ID="IEq1"> <EquationSource Format="TEX">$$k$$</EquationSource> <EquationSource Format="MATHML"> <math xmlns:xlink="http://www.w3.org/1999/xlink"> <mi>k</mi> </math> </EquationSource> </InlineEquation>-...

Article
Are On-Line Personae Really Unlinkable?

More and more personal information is available digitally, both collected by organisations and published by individuals. People may attempt to protect their privacy by avoiding to provide uniquely identifying information and by providing different ...

Article
On the Privacy of Private Browsing — A Forensic Approach

Private browsing has been a popular privacy feature built into all mainstream browsers since 2005. However, despite its prevalent use, the security of this feature has received little attention from the research community. In this paper, we present an ...

Article
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations when two parties that do not know each other need to exchange sensitive information over the Internet. Trust management mechanisms ...

Contributors
  • Polytechnic Institute of Paris
  • National Technical University of Athens School of Electrical and Computer Engineering
  • Norwegian University of Science and Technology
  • University College Cork
Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations