TY - BOOK AU - Atluri,Vijay ED - Annual IFIP WG 11.3 Working Conference on Data and Applications Security TI - Data and applications security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings T2 - Lecture notes in computer science, SN - 9783540705673 AV - QA76.9.D314 I34 2008eb U1 - 004 22 PY - 2008/// CY - Berlin, New York PB - Springer KW - Electronic data processing KW - Distributed processing KW - Security measures KW - Congresses KW - Internet KW - Electronic commerce KW - Database security KW - Computer security KW - Electronic Data Processing KW - Computer Security KW - Traitement réparti KW - Sécurité KW - Mesures KW - Congrès KW - Commerce électronique KW - Bases de données KW - Informatique KW - Sécurité informatique KW - eclas KW - fast KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes bibliographical references and index; Dynamic meta-level access control in SQL -- On the formal analysis of a spatio-temporal role-based access control model -- A unified audit expression model for auditing SQL queries -- A new approach to secure logging -- Security, functionality and scale? -- P4A: A new privacy model for XML -- Privacy-aware collaborative access control in web-based social networks -- A privacy-preserving ticketing system -- The analysis of windows vista disk encryption algorithm -- Shared and searchable encrypted data for untrusted servers -- Secure construction of contingency tables from distributed data -- Web services security: Techniques and challenges (extended abstract) -- Empirical analysis of certificate revocation lists -- Using new tools for certificate repositories generation in MANETs -- Exclusive strategy for generalization algorithms in micro-data disclosure -- Protecting the publishing identity in multiple tuples -- Panel session: What are the key challenges in distributed security? -- On the applicability of trusted computing in distributed authorization using web services -- Sharing but protecting content against internal leakage for organisations -- Regulating exceptions in healthcare using policy spaces -- Towards automation of testing high-level security properties -- An attack graph-based probabilistic security metric -- An opinion model for evaluating malicious activities in pervasive computing systems -- DIWeDa -- detecting intrusions in web databases -- Securing workflows with XACML, RDF and BPEL N2 - Annotation This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008. The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems UR - https://link.springer.com/10.1007/978-3-540-70567-3 ER -