Research Directions in Data and Applications Security XVIII IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain /
As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems. Research Dire...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US,
2004.
|
Σειρά: | IFIP International Federation for Information Processing,
144 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talk I
- Invited Talk - Inference Control Problems in Statistical Database Query Systems
- Access Control
- Attribute Mutability in Usage Control
- Star-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations
- An Extended Analysis of Delegating Obligations
- Implementing Real-Time Update of Access Control Policies
- Data Protection Techniques
- Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases
- Performance-Conscious Key Management in Encrypted Databases
- Damage Discovery in Distributed Database Systems
- Database Theory and Inference Control
- Information Flow Analysis for File Systems and Databases Using Labels
- Refusal in Incomplete Databases
- Why is This User Asking So Many Questions? Explaining Sequences of Queries
- Invited Talk II
- Invited Talk - Towards Semantics-Aware Access Control
- System Security Analysis
- RBAC/MAC Security for UML
- Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephones
- Access Control Design and Management
- Policy-Based Security Management for Enterprise Systems
- A Pattern System for Access Control
- A Design for Parameterized Roles
- Distributed Systems
- Efficient Verification of Delegation in Distributed Group Membership Management
- Web Resource Usage Control in RSCLP
- Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation
- Privacy
- On the Damage and Compensation of Privacy Leakage
- An Experimental Study of Distortion-Based Techniques for Association Rule Hiding
- Privacy-Preserving Multi-Party Decision Tree Induction
- Network Protection and Configuration
- Configuring Storage-Area Networks for Mandatory Security
- A Framework for Trusted Wireless Sensor Networks.