Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings /
For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4127 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Creating Objects in the Flexible Authorization Framework
- Detection and Resolution of Anomalies in Firewall Policy Rules
- On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
- Consolidating the Access Control of Composite Applications and Workflows
- Authenticating Multi-dimensional Query Results in Data Publishing
- Xml Streams Watermarking
- Aggregation Queries in the Database-As-a-Service Model
- Policy Classes and Query Rewriting Algorithm for XML Security Views
- Interactive Analysis of Attack Graphs Using Relational Queries
- Notarized Federated Identity Management for Web Services
- Resolving Information Flow Conflicts in RBAC Systems
- Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
- Term Rewriting for Access Control
- Discretionary and Mandatory Controls for Role-Based Administration
- A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach
- Enhancing User Privacy Through Data Handling Policies
- Efficient Enforcement of Security Policies Based on Tracking of Mobile Users
- A Framework for Flexible Access Control in Digital Library Systems
- Authrule: A Generic Rule-Based Authorization Module
- Aspect-Oriented Risk Driven Development of Secure Applications
- From Business Process Choreography to Authorization Policies
- Information Theoretical Analysis of Two-Party Secret Computation.