The proceedings contain 31 papers. The topics discussed include: secure and efficient proof of storage with deduplication; measuring query privacy in location-based services; deriving implementation-level policies for usage control enforcement; discovering access-control misconfigurations: new approaches and evaluation methodologies; comparison-based encryption for fine-grained access control in clouds; relationship-based access control: its expression and enforcement through hybrid logic; bounding trust in reputation systems with incomplete information; cookie-based privacy issues on Google services; refinement-based design of a group-centric secure information sharing model; risk-based security decisions under uncertainty; quantitative access control with partially-observable Markov decision processes; role engineering: from theory to practice; and privacy streamliner: a two-stage approach to improving algorithm efficiency.

Risk-Based Security Decisions Under Uncertainty

2012

Abstract

The proceedings contain 31 papers. The topics discussed include: secure and efficient proof of storage with deduplication; measuring query privacy in location-based services; deriving implementation-level policies for usage control enforcement; discovering access-control misconfigurations: new approaches and evaluation methodologies; comparison-based encryption for fine-grained access control in clouds; relationship-based access control: its expression and enforcement through hybrid logic; bounding trust in reputation systems with incomplete information; cookie-based privacy issues on Google services; refinement-based design of a group-centric secure information sharing model; risk-based security decisions under uncertainty; quantitative access control with partially-observable Markov decision processes; role engineering: from theory to practice; and privacy streamliner: a two-stage approach to improving algorithm efficiency.
2012
Istituto di informatica e telematica - IIT
Inglese
CODASPY'12
2nd ACM Conference on Data and Application Security and Privacy, CODASPY'12
157
158
2
978-1-4503-1091-8
Association Of Computing Machinery (ACM)
New York
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
7-9 February 2012
San Antonio, TX; United States
access control
classification
ID_PUMA; /cnr.iit/2012-A2-048
0
none
Morisset Charles; Molloy Ian; Dickens Luke; Cheng PauChen; Lobo Jorge; Russo Alessandra
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/123067
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact