E-Book, Englisch, Band 142, 404 Seiten, eBook
Reihe: IFIP International Federation for Information Processing
De Capitani di Vimercati / Indrakshi / Ray Data and Applications Security XVII
Erscheinungsjahr 2006
ISBN: 978-1-4020-8070-8
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Status and Prospects
E-Book, Englisch, Band 142, 404 Seiten, eBook
Reihe: IFIP International Federation for Information Processing
ISBN: 978-1-4020-8070-8
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Information Warfare.- Remote Computer Fingerprinting for Cyber Crime Investigations.- Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases.- Information Assurance.- Delivering Services with Integrity Guarantees in Survivable Database Systems.- Certifying Data from Multiple Sources.- Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model.- Adapting Query Optimization Techniques for Efficient Alert Correlation.- Security and Privacy.- Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases.- Privacy Under Conditions of Concurrent Interaction with Multiple Parties.- Correlated Data Inference.- Anti-Tamper Databases.- Authorization and Access Control in Distributed Systems.- Administration Rights in the SDSD-System.- Secure Authorisation for Web Services.- A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.- Supporting Delegation in Secure Workflow Management Systems.- Security Technologies for the Internet.- Modifying LDAP to Support PKI.- ECPV: EFficient Certificate Path Validation in Public-Key Infrastructure.- Semantics-Aware Perimeter Protection.- Systematic Development of a Family of Fair Exchange Protocols.- Access Control Models and Technologies.- High-Speed Access Control for XML Documents.- Chinese Wall Security Policy Models.- RBAC Policy Implementation for SQL Databases.- An Administrative Model for Role Graphs.- Safety and Liveness for an RBAC/MAC Security Model.- Schema Based XML Security: RBAC Approach.- Persistent Versus Dynamic Role Membership.- FlexFlow: A Flexible Flow Control Policy Specification Framework.- Key Note.- Data and Applications Security: Past, Present and the Future.- Panel.- Digital Forensics: Operational, Legal and Research Issues.