Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings /

For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Damiani, Ernesto (Επιμελητής έκδοσης), Liu, Peng (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4127
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Creating Objects in the Flexible Authorization Framework
  • Detection and Resolution of Anomalies in Firewall Policy Rules
  • On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
  • Consolidating the Access Control of Composite Applications and Workflows
  • Authenticating Multi-dimensional Query Results in Data Publishing
  • Xml Streams Watermarking
  • Aggregation Queries in the Database-As-a-Service Model
  • Policy Classes and Query Rewriting Algorithm for XML Security Views
  • Interactive Analysis of Attack Graphs Using Relational Queries
  • Notarized Federated Identity Management for Web Services
  • Resolving Information Flow Conflicts in RBAC Systems
  • Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
  • Term Rewriting for Access Control
  • Discretionary and Mandatory Controls for Role-Based Administration
  • A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach
  • Enhancing User Privacy Through Data Handling Policies
  • Efficient Enforcement of Security Policies Based on Tracking of Mobile Users
  • A Framework for Flexible Access Control in Digital Library Systems
  • Authrule: A Generic Rule-Based Authorization Module
  • Aspect-Oriented Risk Driven Development of Secure Applications
  • From Business Process Choreography to Authorization Policies
  • Information Theoretical Analysis of Two-Party Secret Computation.