Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings /

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practic...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Atluri, Vijay (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Σειρά:Lecture Notes in Computer Science, 5094
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Access Control
  • Dynamic Meta-level Access Control in SQL
  • On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
  • Audit and Logging
  • A Unified Audit Expression Model for Auditing SQL Queries
  • A New Approach to Secure Logging
  • Keynote
  • Security, Functionality and Scale?
  • Privacy I
  • P4A: A New Privacy Model for XML
  • Privacy-Aware Collaborative Access Control in Web-Based Social Networks
  • A Privacy-Preserving Ticketing System
  • The Analysis of Windows Vista Disk Encryption Algorithm
  • Shared and Searchable Encrypted Data for Untrusted Servers
  • Secure Construction of Contingency Tables from Distributed Data
  • Web Services Security: Techniques and Challenges (Extended Abstract)
  • Empirical Analysis of Certificate Revocation Lists
  • Using New Tools for Certificate Repositories Generation in MANETs
  • Privacy II
  • Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
  • Protecting the Publishing Identity in Multiple Tuples
  • Panel Session: What Are the Key Challenges in Distributed Security?
  • On the Applicability of Trusted Computing in Distributed Authorization Using Web Services
  • Sharing but Protecting Content Against Internal Leakage for Organisations
  • Regulating Exceptions in Healthcare Using Policy Spaces
  • Towards Automation of Testing High-Level Security Properties
  • An Attack Graph-Based Probabilistic Security Metric
  • An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
  • DIWeDa - Detecting Intrusions in Web Databases
  • Securing Workflows with XACML, RDF and BPEL.