Ebook: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings
Author: Theodore Johnson S. Muthukrishnan Oliver Spatscheck (auth.) Sushil Jajodia Duminda Wijesekera (eds.)
- Genre: Education // International Conferences and Symposiums
- Tags: Data Encryption, Computer Communication Networks, Special Purpose and Application-Based Systems, Operating Systems, Algorithm Analysis and Problem Complexity, Management of Computing and Information Systems
- Series: Lecture Notes in Computer Science 3654 : Information Systems and Applications incl. Internet/Web and HCI
- Year: 2005
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, CT, USA, in August 2005.
The 24 revised full papers presented together with an invited lecture were thoroughly reviewed and selected from 54 submissions. The papers present theory, technique, applications, and practical experience of data and application security with topics like cryptography, privacy, security planning and administration, secure information integration, secure semantic Web technologies and applications, access control, integrity maintenance, knowledge discovery and privacy, concurrency control, fault-tolerance and recovery methods.
This book constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, CT, USA, in August 2005.
The 24 revised full papers presented together with an invited lecture were thoroughly reviewed and selected from 54 submissions. The papers present theory, technique, applications, and practical experience of data and application security with topics like cryptography, privacy, security planning and administration, secure information integration, secure semantic Web technologies and applications, access control, integrity maintenance, knowledge discovery and privacy, concurrency control, fault-tolerance and recovery methods.