[click for picture] 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '13)
Rutgers University, Newark, NJ, USA, July 15-17, 2013
dummy dummy
Call for Papers  [pdf]   |    Committees   |    Important Dates   |    Submissions   |    Advanced Program   |    Registration   |    Hotel   |    Travel

Advance Program (in pdf)

July 15, 2013



08:00 - 09:00


09:00 - 09:30


09:30 - 10:30

Keynote Session

Chair: Jaideep Vaidya

Privacy-Utility Tradeoffs for Data Sources, with Applications in Smart Grid

H. Vincent Poor, Princeton University

10:30 - 11:00

Coffee Break

Session 1

Privacy I

Chair: Basit Shafiq


Extending Loose Associations to Multiple Fragments

Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati

Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can Two Keep a Secret?

Joachim Biskup and Marcel Preuß

Real-Time Publication of Multi-Dimensional Time-Series with Differential Privacy

Liyue Fan, Li Xiong and Vaidy Sunderam

12:30 - 13:30


Session 2

Access Control

Chair: Joachim Biskup


Policy Analysis for Administrative Role Based Access Control without Separate Administration

Ping Yang, Mikhail Gofman and Zijiang Yang

Toward Mining of Temporal Roles

Barsha Mitra, Shamik Sural, Vijay Atluri and Jaideep Vaidya

Towards User-Oriented RBAC Model

Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan and Nazia Badar

15:00 - 15:30

Coffee Break

Session 3

Cloud Computing

Chair: Meng Yu


Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations

Sean Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, and Robert France

TerraCheck: Verification of Dedicated Cloud Storage

Zhan Wang, Kun Sun, Sushil Jajodia and Jiwu Jing

17:30 - 22:30

Dinner Cruise (Social Event)

July 16, 2013

08:00 -


08:00 - 09:00


Keynote Session

Chair: Soon Ae Chun

09:00 - 10:00

Research Questions in Data Privacy and Security for App Ecosystems

Johannes Gehrke, Cornell University

10:00 - 10:30

Coffee Break

Session 4

Privacy II

Chair: Florian Kerschbaum

10:30 - 12:00

Fair Private Set Intersection with a Semi-trusted Arbiter

Changyu Dong, Liqun Chen, Jan Camenisch and Giovanni Russello

Bloom Filter Bootstrap: Privacy-Preserving Estimation of the Size of an Intersection

Hiroaki Kikuchi and Jun Sakuma

Using Safety Constraint for Transactional Dataset Anonymization

Bechara Al Bouna, Chris Clifton and Qutaibah Malluhi

12:00 - 13:00


Session 5

Data Outsourcing

Chair: Sabrina De Capitani di Vimercati

13:00 - 14:30

Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases

Attila Yavuz

Optimal Re-Encryption Strategy for Joins in Encrypted Databases

Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer and Walter Tighzert

Access Control and Query Verification for Untrusted Databases

Rohit Jain and Sunil Prabhakar

14:30 - 15:00

Coffee Break

Session 6

Mobile Computing

Chair: Nineta Polemi

15:00 - 16:00

Quantitative Security Risk Assessment of Android Permissions and Applications

Yang Wang, Jun Zheng, Chen Sun and Srinivas Mukkamala

A Model for Trust-based Access Control and Delegation in Mobile Clouds

Indrajit Ray, Dieudonne Mulamba, Indrakshi Ray and Keesook J. Han

16:00 - 17:00

IFIP 11.3 Business Meeting

July 17, 2013

08:00 -


08:00 - 09:00


Session 7

Short Paper I

Chair: Indrajit Ray

09:00 - 10:00

Result Integrity Verification of Outsourced Frequent Itemset Mining

Boxiang Dong, Ruilin Liu and Hui Wendy Wang

An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS

Le Minh Sang Tran, Bjørnar Solhaug and Ketil Stølen

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase

Benjamin Justus, Frédéric Cuppens, Nora Cuppens, Julien Bringer, Hervé Chabanne and Olivier Cipiere

10:00 - 10:30

Coffee Break

Session 8

Short Paper II

Chair: Shamik Sural

10:30 - 11:30

Rule Enforcement with Third Parties in Secure Cooperative Data Access

Meixing Le, Krishna Kant and Sushil Jajodia

Unlinkable Content Playbacks in a Multiparty DRM System

Ronald Petrlic and Stephan Sekula

Analysis of TRBAC with Dynamic Temporal Role Hierarchies

Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya and Shamik Sural