Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings /
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practic...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2008.
|
Σειρά: | Lecture Notes in Computer Science,
5094 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Access Control
- Dynamic Meta-level Access Control in SQL
- On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
- Audit and Logging
- A Unified Audit Expression Model for Auditing SQL Queries
- A New Approach to Secure Logging
- Keynote
- Security, Functionality and Scale?
- Privacy I
- P4A: A New Privacy Model for XML
- Privacy-Aware Collaborative Access Control in Web-Based Social Networks
- A Privacy-Preserving Ticketing System
- The Analysis of Windows Vista Disk Encryption Algorithm
- Shared and Searchable Encrypted Data for Untrusted Servers
- Secure Construction of Contingency Tables from Distributed Data
- Web Services Security: Techniques and Challenges (Extended Abstract)
- Empirical Analysis of Certificate Revocation Lists
- Using New Tools for Certificate Repositories Generation in MANETs
- Privacy II
- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
- Protecting the Publishing Identity in Multiple Tuples
- Panel Session: What Are the Key Challenges in Distributed Security?
- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services
- Sharing but Protecting Content Against Internal Leakage for Organisations
- Regulating Exceptions in Healthcare Using Policy Spaces
- Towards Automation of Testing High-Level Security Properties
- An Attack Graph-Based Probabilistic Security Metric
- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
- DIWeDa - Detecting Intrusions in Web Databases
- Securing Workflows with XACML, RDF and BPEL.