


default search action
19. ESORICS 2014: Wroclaw, Poland - DPM/SETOP/QASA
- Joaquín García-Alfaro

, Jordi Herrera-Joancomartí
, Emil Lupu, Joachim Posegga, Alessandro Aldini
, Fabio Martinelli, Neeraj Suri
:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8872, Springer 2015, ISBN 978-3-319-17015-2
Keynote Talks
- Jordi Herrera-Joancomartí

:
Research and Challenges on Bitcoin Anonymity. 3-16 - Elisa Bertino:

Data Trustworthiness - Approaches and Research Challenges. 17-25 - Audun Jøsang

:
Assurance Requirements for Mutual User and Service Provider Authentication. 26-44
Data Privacy Management
- Josep Domingo-Ferrer

, Alberto Blanco-Justicia
:
Group Discounts Compatible with Buyer Privacy. 47-57 - Sébastien Gambs, Samuel Ranellucci, Alain Tapp:

The Crypto-Democracy and the Trustworthy (Position Paper). 58-76 - Markus Tschersich:

Configuration Behavior of Restrictive Default Privacy Settings on Social Network Sites - Analyzing the Combined Effect of Default Settings and Interface Style. 77-94 - Maria N. Koukovini, Eugenia I. Papagiannakopoulou

, Georgios V. Lioudakis
, Nikolaos L. Dellas, Dimitra I. Kaklamani, Iakovos S. Venieris:
Towards Inherent Privacy Awareness in Workflows. 95-113 - Jens Köhler, Hannes Hartenstein:

Index Optimization for L-Diversified Database-as-a-Service. 114-132 - Alberto Blanco-Justicia

, Josep Domingo-Ferrer
:
Privacy-Preserving Loyalty Programs. 133-146 - Sarah Abughazalah, Konstantinos Markantonakis

, Keith Mayes:
Secure Improved Cloud-Based RFID Authentication Protocol. 147-164
Autonomous and Spontaneous Security
- Tarek Bouyahia, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:

Metric for Security Activities Assisted by Argumentative Logic. 183-197
Quantitative Aspects in Security Assurance
- Wolter Pieters, Mohsen Davarynejad

:
Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. 201-215 - Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin

:
Analysis of Social Engineering Threats with Attack Graphs. 216-232 - Jerry den Hartog, Ilaria Matteucci

:
Introducing Probabilities in Controller Strategies. 233-249 - Tom Chothia, Chris Novakovic

, Rajiv Ranjan Singh
:
Automatically Calculating Quantitative Integrity Measures for Imperative Programs. 250-265 - Alessandro Armando

, Michele Bezzi, Nadia Metoui
, Antonino Sabetta:
Risk-Aware Information Disclosure. 266-276 - Christian Johansen

, Audun Jøsang
:
Probabilistic Modelling of Humans in Security Ceremonies. 277-292 - Maxime Puys

, Lionel Rivière, Julien Bringer, Thanh-Ha Le:
High-Level Simulation for Multiple Fault Injection Evaluation. 293-308
Short Papers
- Bernardo Ferreira

, João Rodrigues, João Leitão
, Henrique João L. Domingos
:
Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties. 311-318 - Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen

, Karin Bernsmed, Anderson Santana de Oliveira, Jakub Sendor:
A-PPL: An Accountability Policy Language. 319-326 - Roger Jardí-Cedó, Jordi Castellà-Roca

, Alexandre Viejo
:
Privacy-Preserving Electronic Toll System with Dynamic Pricing for Low Emission Zones. 327-334 - Amel Hamzaoui, Qutaibah M. Malluhi, Chris Clifton, Ryan D. Riley:

Association Rule Mining on Fragmented Database. 335-342

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














