Data and Applications Security XVII - Status and Prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6 2003, Estes Park, Colorado, USA
Data and Applications Security XVII - Status and Prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6 2003, Estes Park, Colorado, USA
Click to enlarge
ISBN No.: 9781402080692
Pages: xxiii, 404
Year: 200407
Format: Trade Cloth (Hard Cover)
Price: $ 234.59
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Contributing Authors. Preface. Conference Committees. One: Information Warfare. Remote Computer Fingerprinting for Cyber Crime Investigations; J. Novotny, et al. Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases; P. Ragothaman, B.


Panda. Two: Information Assurance. Delivering Services with Integrity Guarantees in Survivable Database Systems; Jianyong Zhang, Peng Liu. Certifying Data from Multiple Sources; G. Nuckolls, et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model; H. Hacigümüs, et al. Adapting Query Optimization Techniques for Efficient Alert Correlation; Peng Ning, Dingbang Xu.


Three: Security and Privacy. Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases; E. Gudes, B. Rozenberg. Privacy under Conditions of Concurrent Interaction with Multiple Parties; M.S. Oliver. Correlated Data Inference; C.


Farkas, A.G. Stoica. Anti-Tamper Databases: Querying Encrypted Databases; G. Ozsoyoglu, et al. Four: Authorization and Access Control in Distributed Systems. Administration Rights in the SDSD-System; J. Biskup, et al.


Secure Authorization for Web Services; S. Indrakanti, et al. A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities; E. Bertino, et al. Supporting Delegation in Secure Workflow Management Systems; V. Atluri, et al. Five: Security Technologies for the Internet. Modifying LDAP to Support PKI; D.


W. Chadwick, et al. ECPV: Efficient Certificate Path Validation in Public-Key Infrastructure; M. Halappanavar, R. Mukkamala. Semantics-Aware Perimeter Protection; M. Cremonini, et al. Systematic Development of a Family of Fair Exchange Protocols; P.


D. Ezhilchelvan, S.K. Shrivastava. Six: Access Control Models and Technologies. High-Speed Access Control for XML Documents; Jong P. Yoon. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses; Tsau Young Lin.


RBAC Policy Implementation for SQL Databases; S. Barker, P. Douglas. An Administrative Model for Role Graphs; He Wang, S.L. Osborne. Safety and Liveness for an RBAC/MAC Security Model; C. Phillips, et al.


Schema-Based XML Security: RBAC Approach; Xinwen Zhang, et al. Persistent versus Dynamic Role Membership; J. Bacon, et al. FlexFlow: A Flexible Flow Control Policy Specification Framework; Shiping Chen, et al. Seven: Key Note. Data and Applications Security: Past, Present and Future; B. Thuraisingham. Eight: Panel.


Digital Forensics: Operational, Legal and Research Issues; M. Pollitt, et al.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...