E-Book, Englisch, Band 144, 385 Seiten, eBook
Reihe: IFIP International Federation for Information Processing
Farkas / Samarati Research Directions in Data and Applications Security XVIII
Erscheinungsjahr 2006
ISBN: 978-1-4020-8128-6
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain
E-Book, Englisch, Band 144, 385 Seiten, eBook
Reihe: IFIP International Federation for Information Processing
ISBN: 978-1-4020-8128-6
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Invited Talk I.- Invited Talk - Inference Control Problems in Statistical Database Query Systems.- Access Control.- Attribute Mutability in Usage Control.- Star-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations.- An Extended Analysis of Delegating Obligations.- Implementing Real-Time Update of Access Control Policies.- Data Protection Techniques.- Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.- Performance-Conscious Key Management in Encrypted Databases.- Damage Discovery in Distributed Database Systems.- Database Theory and Inference Control.- Information Flow Analysis for File Systems and Databases Using Labels.- Refusal in Incomplete Databases.- Why is This User Asking So Many Questions? Explaining Sequences of Queries.- Invited Talk II.- Invited Talk - Towards Semantics-Aware Access Control.- System Security Analysis.- RBAC/MAC Security for UML.- Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephones.- Access Control Design and Management.- Policy-Based Security Management for Enterprise Systems.- A Pattern System for Access Control.- A Design for Parameterized Roles.- Distributed Systems.- Efficient Verification of Delegation in Distributed Group Membership Management.- Web Resource Usage Control in RSCLP.- Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation.- Privacy.- On the Damage and Compensation of Privacy Leakage.- An Experimental Study of Distortion-Based Techniques for Association Rule Hiding.- Privacy-Preserving Multi-Party Decision Tree Induction.- Network Protection and Configuration.- Configuring Storage-Area Networks for Mandatory Security.- A Framework for Trusted Wireless Sensor Networks.