Amazon cover image
Image from Amazon.com

Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / Vijay Atluri (ed.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 5094. | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.Publication details: Berlin ; New York : Springer, ©2008.Description: 1 online resource (xi, 345 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540705673
  • 3540705678
Other title:
  • IFIP WG 11.3 Working Conference on Data and Applications Security
  • 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Subject(s): Genre/Form: Additional physical formats: Print version:: Data and applications security XXII.DDC classification:
  • 004 22
LOC classification:
  • QA76.9.D314 I34 2008eb
Online resources:
Contents:
Dynamic meta-level access control in SQL -- On the formal analysis of a spatio-temporal role-based access control model -- A unified audit expression model for auditing SQL queries -- A new approach to secure logging -- Security, functionality and scale? -- P4A: A new privacy model for XML -- Privacy-aware collaborative access control in web-based social networks -- A privacy-preserving ticketing system -- The analysis of windows vista disk encryption algorithm -- Shared and searchable encrypted data for untrusted servers -- Secure construction of contingency tables from distributed data -- Web services security: Techniques and challenges (extended abstract) -- Empirical analysis of certificate revocation lists -- Using new tools for certificate repositories generation in MANETs -- Exclusive strategy for generalization algorithms in micro-data disclosure -- Protecting the publishing identity in multiple tuples -- Panel session: What are the key challenges in distributed security? -- On the applicability of trusted computing in distributed authorization using web services -- Sharing but protecting content against internal leakage for organisations -- Regulating exceptions in healthcare using policy spaces -- Towards automation of testing high-level security properties -- An attack graph-based probabilistic security metric -- An opinion model for evaluating malicious activities in pervasive computing systems -- DIWeDa -- detecting intrusions in web databases -- Securing workflows with XACML, RDF and BPEL.
Summary: Annotation This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008. The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and index.

Dynamic meta-level access control in SQL -- On the formal analysis of a spatio-temporal role-based access control model -- A unified audit expression model for auditing SQL queries -- A new approach to secure logging -- Security, functionality and scale? -- P4A: A new privacy model for XML -- Privacy-aware collaborative access control in web-based social networks -- A privacy-preserving ticketing system -- The analysis of windows vista disk encryption algorithm -- Shared and searchable encrypted data for untrusted servers -- Secure construction of contingency tables from distributed data -- Web services security: Techniques and challenges (extended abstract) -- Empirical analysis of certificate revocation lists -- Using new tools for certificate repositories generation in MANETs -- Exclusive strategy for generalization algorithms in micro-data disclosure -- Protecting the publishing identity in multiple tuples -- Panel session: What are the key challenges in distributed security? -- On the applicability of trusted computing in distributed authorization using web services -- Sharing but protecting content against internal leakage for organisations -- Regulating exceptions in healthcare using policy spaces -- Towards automation of testing high-level security properties -- An attack graph-based probabilistic security metric -- An opinion model for evaluating malicious activities in pervasive computing systems -- DIWeDa -- detecting intrusions in web databases -- Securing workflows with XACML, RDF and BPEL.

Print version record.

Annotation This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008. The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems.

English.

Powered by Koha