|
" Research Directions in Data and Applications Security Ifip Tc11 "
Wg11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, Uk.
Document Type
|
:
|
BL
|
Record Number
|
:
|
725447
|
Doc. No
|
:
|
b545166
|
Main Entry
|
:
|
Wg11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, Uk.
|
Title & Author
|
:
|
Research Directions in Data and Applications Security Ifip Tc11\ Wg11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, Uk.
|
Publication Statement
|
:
|
Springer-Verlag New York Inc, 2013
|
ISBN
|
:
|
0387356975
|
|
:
|
: 9780387356976
|
Contents
|
:
|
Contributing Authors. Preface. I: Role-Based Access Control. 1. Shielding RBAC Infrastructures from Cyberterrorism; A. Belokosztolszki, D. Eyers. 2. Privelege Administration for the Role Graph Model; C. Ionita, S. Osborn. 3. Implementing RBAC Policies; S. Barker, et al. 4. Role Delegation for a Resource-Based Security Model; M. Liebrand, et al. 5. Using X.509 Attribute Certificates for Role-Based EAM; Dongwan Shin, et al. 6. Implementing Workflow Systems; L. Dreyer, M. Olivier. II: Database Security. 7. Multiphase Damage Confinement System for Databases; Peng Liu, Ying Wang. 8. Analyzing Transaction Logs for Effective Damage Assessment; P. Ragothaman, B. Panda. 9. Deductive Database Security; S. Baker. III: XML Security. 10. Towards Secure XML Federations; Lingyu Wang, et al. 11. Secure XML Views; A. Stoica, C. Farkas. 12. Distributed Cooperative Updates of XML Documents; E. Bertino, et al. IV: Data Mining and Inference. 13. On Security and Privacy Risks in Association Mining Algorithms; T. Johnsten, et al. 14. Mining Malicious Corruption of Data with Hidden Markov Models; D. Barbara, et al. 15. A Study of Inference Problems in Distributed Databases; LiWu Chang, I. Moskowitz. V: Multimedia System Security. 16. Uniform Indexing for Geospatial Data and Authorizations; V. Atluri, P. Mazzoleni. 17. Access Control of SVG Documents; E. Damiani, et al. VI: Network Security. 18. On Modeling Computer Networks for VulnerabilityAnalysis; C. Campbell, et al. 19. On-Line Intrusion Protection by Detecting Attacks with Diversity; J. Reynolds, et al. VII: Public Key Infrastructure. 20. Recertification: A Technique to Improve Services in PKI; R. Mukkamala, et al. 21. A Hybrid PKI Model: Application to Secure Mediation; J. Biskup, Y. Karabulut. VIII: Formal Methods and Protocols. 22. Implementation and Verification of Programmable Security; S. Magill, et al. 23. A Process Algebraic Approach to Security Policies; P. Ryan, R. Ryvold Arnesen. 24. Anonymous and Secure Multicast Subscription; Indrajit Ray, Indrakshi Ray. IX: Security and Privacy. 25.Privacy and Civil Liberties. D. Chadwick, et al.
|
LC Classification
|
:
|
QA76.9.D314W475 2013
|
Added Entry
|
:
|
Gudes, Ehud; Shenoi, Sujeet
|
| |