Bibliografie

Detailansicht

Data and Applications Security XVII

Status and Prospects, IFIP International Federation for Information Processing, Volume 142, IFIP Advances in Information and Communication Technology 142
ISBN/EAN: 9781402080692
Umbreit-Nr.: 1464159

Sprache: Englisch
Umfang: xxiii, 404 S.
Format in cm:
Einband: gebundenes Buch

Erschienen am 27.07.2004
€ 160,49
(inklusive MwSt.)
Lieferbar innerhalb 1 - 2 Wochen
  • Zusatztext
    • Inhaltsangabe- Contributing Authors. Preface. Conference Committees. One: Information Warfare. Remote Computer Fingerprinting for Cyber Crime Investigations; J. Novotny, et al. Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases; P. Ragothaman, B. Panda. Two: Information Assurance. Delivering Services with Integrity Guarantees in Survivable Database Systems; Jianyong Zhang, Peng Liu. Certifying Data from Multiple Sources; G. Nuckolls, et al. Ensuring the Integrity of Encrypted Databases in the DatabaseasaService Model; H. Hacigümüs, et al. Adapting Query Optimization Techniques for Efficient Alert Correlation; Peng Ning, Dingbang Xu. Three: Security and Privacy. Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases; E. Gudes, B. Rozenberg. Privacy under Conditions of Concurrent Interaction with Multiple Parties; M.S. Oliver. Correlated Data Inference; C. Farkas, A.G. Stoica. AntiTamper Databases: Querying Encrypted Databases; G. Ozsoyoglu, et al. Four: Authorization and Access Control in Distributed Systems. Administration Rights in the SDSDSystem; J. Biskup, et al. Secure Authorization for Web Services; S. Indrakanti, et al. A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities; E. Bertino, et al. Supporting Delegation in Secure Workflow Management Systems; V. Atluri, et al. Five: Security Technologies for the Internet. Modifying LDAP to Support PKI; D.W. Chadwick, et al. ECPV: Efficient Certificate Path Validation in PublicKey Infrastructure; M. Halappanavar, R. Mukkamala. SemanticsAware Perimeter Protection; M. Cremonini, et al. Systematic Development of a Family of Fair Exchange Protocols; P.D. Ezhilchelvan, S.K. Shrivastava. Six: Access Control Models and Technologies. HighSpeed Access Control for XML Documents; Jong P. Yoon. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses; Tsau Young Lin. RBAC Policy Implementation for SQL Databases; S. Barker, P. Douglas. An Administrative Model for Role Graphs; He Wang, S.L. Osborne. Safety and Liveness for an RBAC/MAC Security Model; C. Phillips, et al. SchemaBased XML Security: RBAC Approach; Xinwen Zhang, et al. Persistent versus Dynamic Role Membership; J. Bacon, et al. FlexFlow: A Flexible Flow Control Policy Specification Framework; Shiping Chen, et al. Seven: Key Note. Data and Applications Security: Past, Present and Future; B. Thuraisingham. Eight: Panel. Digital Forensics: Operational, Legal and Research Issues; M. Pollitt, et al.

  • Kurztext
    • Describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace

  • Autorenportrait
    • InhaltsangabeContributing Authors. Preface. Conference Committees. One: Information Warfare. Remote Computer Fingerprinting for Cyber Crime Investigations; J. Novotny, et al. Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases; P. Ragothaman, B. Panda. Two: Information Assurance. Delivering Services with Integrity Guarantees in Survivable Database Systems; Jianyong Zhang, Peng Liu. Certifying Data from Multiple Sources; G. Nuckolls, et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model; H. Hacigümüs, et al. Adapting Query Optimization Techniques for Efficient Alert Correlation; Peng Ning, Dingbang Xu. Three: Security and Privacy. Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases; E. Gudes, B. Rozenberg. Privacy under Conditions of Concurrent Interaction with Multiple Parties; M.S. Oliver. Correlated Data Inference; C. Farkas, A.G. Stoica. Anti-Tamper Databases: Querying Encrypted Databases; G. Ozsoyoglu, et al. Four: Authorization and Access Control in Distributed Systems. Administration Rights in the SDSD-System; J. Biskup, et al. Secure Authorization for Web Services; S. Indrakanti, et al. A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities; E. Bertino, et al. Supporting Delegation in Secure Workflow Management Systems; V. Atluri, et al. Five: Security Technologies for the Internet. Modifying LDAP to Support PKI; D.W. Chadwick, et al. ECPV: Efficient Certificate Path Validation in Public-Key Infrastructure; M. Halappanavar, R. Mukkamala. Semantics-Aware PerimeterProtection; M. Cremonini, et al. Systematic Development of a Family of Fair Exchange Protocols; P.D. Ezhilchelvan, S.K. Shrivastava. Six: Access Control Models and Technologies. High-Speed Access Control for XML Documents; Jong P. Yoon. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses; Tsau Young Lin. RBAC Policy Implementation for SQL Databases; S. Barker, P. Douglas. An Administrative Model for Role Graphs; He Wang, S.L. Osborne. Safety and Liveness for an RBAC/MAC Security Model; C. Phillips, et al. Schema-Based XML Security: RBAC Approach; Xinwen Zhang, et al. Persistent versus Dynamic Role Membership; J. Bacon, et al. FlexFlow: A Flexible Flow Control Policy Specification Framework; Shiping Chen, et al. Seven: Key Note. Data and Applications Security: Past, Present and Future; B. Thuraisingham. Eight: Panel. Digital Forensics: Operational, Legal and Research Issues; M. Pollitt, et al.
Lädt …