My Account Log in

1 option

Data and Applications Security XX : 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings / edited by Ernesto Damiani, Peng Liu.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Damiani, Ernesto, 1960- editor.
Liu, Peng, 1970- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Information systems and applications, incl. Internet/Web, and HCI ; SL 3, 4127.
Information Systems and Applications, incl. Internet/Web, and HCI ; 4127
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Operating systems (Computers).
Management information systems.
Computer science.
Algorithms.
Computers, Special purpose.
Cryptology.
Computer Communication Networks.
Operating Systems.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Special Purpose and Application-Based Systems.
Local Subjects:
Cryptology.
Computer Communication Networks.
Operating Systems.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Special Purpose and Application-Based Systems.
Physical Description:
1 online resource (X, 319 pages).
Edition:
First edition 2006.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
System Details:
text file PDF
Summary:
For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of the change that has occurred in our ?eld. Once considered afterthoughts in systems and application design, data protection, privacy and trust have become the key problems of our day. This central role of security in the information society has however brought increased responsibilities to the research community. - day practitioners and researchers alike need to ?nd new ways to cope with the increasing scale and complexity of the security problems that must be solved on the global information infrastructure. Like the previous conference, the 20th DBSEC has proved to be up to this challenge. DBSEC 2006 received 56 submissions, out of which the program committee selected22 high-qualitypaperscoveringanumber of diverseresearchtopicssuch as access control, privacy, and identity management. We are glad to see that the ?nal program contains a well-balanced mix of theoretical results and practical prototype systems, many of them converging and building o? each other. Also, the DBSEC program includes a number of papers on new, emerging aspects of security research. Putting together a top-level conference like DBSEC is always a team e?ort.
Contents:
Creating Objects in the Flexible Authorization Framework
Detection and Resolution of Anomalies in Firewall Policy Rules
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
Consolidating the Access Control of Composite Applications and Workflows
Authenticating Multi-dimensional Query Results in Data Publishing
Xml Streams Watermarking
Aggregation Queries in the Database-As-a-Service Model
Policy Classes and Query Rewriting Algorithm for XML Security Views
Interactive Analysis of Attack Graphs Using Relational Queries
Notarized Federated Identity Management for Web Services
Resolving Information Flow Conflicts in RBAC Systems
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
Term Rewriting for Access Control
Discretionary and Mandatory Controls for Role-Based Administration
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach
Enhancing User Privacy Through Data Handling Policies
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users
A Framework for Flexible Access Control in Digital Library Systems
Authrule: A Generic Rule-Based Authorization Module
Aspect-Oriented Risk Driven Development of Secure Applications
From Business Process Choreography to Authorization Policies
Information Theoretical Analysis of Two-Party Secret Computation.
Other Format:
Printed edition:
ISBN:
978-3-540-36799-4
9783540367994
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account