Data and Applications Security XVII Status and Prospects /

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivi...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Capitani di Vimercati, Sabrina De (Επιμελητής έκδοσης), Ray, Indrakshi (Επιμελητής έκδοσης), Ray, Indrajit (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2004.
Σειρά:IFIP International Federation for Information Processing, 142
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05607nam a22005535i 4500
001 978-1-4020-8070-8
003 DE-He213
005 20151030191011.0
007 cr nn 008mamaa
008 100301s2004 xxu| s |||| 0|eng d
020 |a 9781402080708  |9 978-1-4020-8070-8 
024 7 |a 10.1007/b116220  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D35 
072 7 |a UMB  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
082 0 4 |a 005.74  |2 23 
245 1 0 |a Data and Applications Security XVII  |h [electronic resource] :  |b Status and Prospects /  |c edited by Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray. 
264 1 |a Boston, MA :  |b Springer US,  |c 2004. 
300 |a XXIII, 403 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a IFIP International Federation for Information Processing,  |x 1571-5736 ;  |v 142 
505 0 |a Information Warfare -- Remote Computer Fingerprinting for Cyber Crime Investigations -- Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases -- Information Assurance -- Delivering Services with Integrity Guarantees in Survivable Database Systems -- Certifying Data from Multiple Sources -- Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model -- Adapting Query Optimization Techniques for Efficient Alert Correlation -- Security and Privacy -- Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases -- Privacy Under Conditions of Concurrent Interaction with Multiple Parties -- Correlated Data Inference -- Anti-Tamper Databases -- Authorization and Access Control in Distributed Systems -- Administration Rights in the SDSD-System -- Secure Authorisation for Web Services -- A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities -- Supporting Delegation in Secure Workflow Management Systems -- Security Technologies for the Internet -- Modifying LDAP to Support PKI -- ECPV: EFficient Certificate Path Validation in Public-Key Infrastructure -- Semantics-Aware Perimeter Protection -- Systematic Development of a Family of Fair Exchange Protocols -- Access Control Models and Technologies -- High-Speed Access Control for XML Documents -- Chinese Wall Security Policy Models -- RBAC Policy Implementation for SQL Databases -- An Administrative Model for Role Graphs -- Safety and Liveness for an RBAC/MAC Security Model -- Schema Based XML Security: RBAC Approach -- Persistent Versus Dynamic Role Membership -- FlexFlow: A Flexible Flow Control Policy Specification Framework -- Key Note -- Data and Applications Security: Past, Present and the Future -- Panel -- Digital Forensics: Operational, Legal and Research Issues. 
520 |a Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Data structures (Computer science). 
650 0 |a Computers. 
650 0 |a Information storage and retrieval. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Information Storage and Retrieval. 
700 1 |a Capitani di Vimercati, Sabrina De.  |e editor. 
700 1 |a Ray, Indrakshi.  |e editor. 
700 1 |a Ray, Indrajit.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781402080692 
830 0 |a IFIP International Federation for Information Processing,  |x 1571-5736 ;  |v 142 
856 4 0 |u http://dx.doi.org/10.1007/b116220  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)