Research Directions in Data and Applications Security XVIII IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain /

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems. Research Dire...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Farkas, Csilla (Επιμελητής έκδοσης), Samarati, Pierangela (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2004.
Σειρά:IFIP International Federation for Information Processing, 144
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talk I
  • Invited Talk - Inference Control Problems in Statistical Database Query Systems
  • Access Control
  • Attribute Mutability in Usage Control
  • Star-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations
  • An Extended Analysis of Delegating Obligations
  • Implementing Real-Time Update of Access Control Policies
  • Data Protection Techniques
  • Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases
  • Performance-Conscious Key Management in Encrypted Databases
  • Damage Discovery in Distributed Database Systems
  • Database Theory and Inference Control
  • Information Flow Analysis for File Systems and Databases Using Labels
  • Refusal in Incomplete Databases
  • Why is This User Asking So Many Questions? Explaining Sequences of Queries
  • Invited Talk II
  • Invited Talk - Towards Semantics-Aware Access Control
  • System Security Analysis
  • RBAC/MAC Security for UML
  • Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephones
  • Access Control Design and Management
  • Policy-Based Security Management for Enterprise Systems
  • A Pattern System for Access Control
  • A Design for Parameterized Roles
  • Distributed Systems
  • Efficient Verification of Delegation in Distributed Group Membership Management
  • Web Resource Usage Control in RSCLP
  • Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation
  • Privacy
  • On the Damage and Compensation of Privacy Leakage
  • An Experimental Study of Distortion-Based Techniques for Association Rule Hiding
  • Privacy-Preserving Multi-Party Decision Tree Induction
  • Network Protection and Configuration
  • Configuring Storage-Area Networks for Mandatory Security
  • A Framework for Trusted Wireless Sensor Networks.