Online Library TheLib.net » Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK
cover of the book Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

Ebook: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

00
27.01.2024
0
0

Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include:

-Role-Based Access Control;
-Database Security;
-XML Security;
-Data Mining and Inference;
-Multimedia System Security;
-Network Security;
-Public Key Infrastructure;
-Formal Methods and Protocols;
-Security and Privacy.








Content:
Front Matter....Pages i-xix
Front Matter....Pages 1-1
Shielding RBAC Infrastructures from Cyberterrorism....Pages 3-14
Privilege Administration for the Role Graph Model....Pages 15-25
Implementing RBAC Policies....Pages 27-36
Role Delegation for a Resource-Based Security Model....Pages 37-48
Using X.509 Attribute Certificates for Role-Based EAM....Pages 49-60
Implementing Workflow Systems....Pages 61-72
Front Matter....Pages 73-73
Multiphase Damage Confinement System for Databases....Pages 75-87
Analyzing Transaction Logs for Effective Damage Assessment....Pages 89-101
Deductive Database Security....Pages 103-114
Front Matter....Pages 115-115
Towards Secure XML Federations....Pages 117-131
Secure XML Views....Pages 133-146
Distributed Cooperative Updates of XML Documents....Pages 147-159
Front Matter....Pages 161-161
On Security and Privacy Risks in Association Mining Algorithms....Pages 163-174
Mining Malicious Corruption of Data with Hidden Markov Models....Pages 175-189
A Study of Inference Problems in Distributed Databases....Pages 191-204
Front Matter....Pages 205-205
Uniform Indexing for Geospatial Data and Authorizations....Pages 207-218
Access Control of SVG Documents....Pages 219-230
Front Matter....Pages 231-231
On Modeling Computer Networks for Vulnerability Analysis....Pages 233-244
On-Line Intrusion Protection by Detecting Attacks with Diversity....Pages 245-256
Front Matter....Pages 257-257
Recertification: A Technique to Improve Services in PKI....Pages 259-270
Front Matter....Pages 257-257
A Hybrid PKI Model: Application to Secure Mediation....Pages 271-282
Front Matter....Pages 283-283
Implementation and Verification of Programmable Security....Pages 285-299
A Process Algebraic Approach to Security Policies....Pages 301-312
Anonymous and Secure Multicast Subscription....Pages 313-327
Front Matter....Pages 329-329
Privacy and Civil Liberties....Pages 331-346



Content:
Front Matter....Pages i-xix
Front Matter....Pages 1-1
Shielding RBAC Infrastructures from Cyberterrorism....Pages 3-14
Privilege Administration for the Role Graph Model....Pages 15-25
Implementing RBAC Policies....Pages 27-36
Role Delegation for a Resource-Based Security Model....Pages 37-48
Using X.509 Attribute Certificates for Role-Based EAM....Pages 49-60
Implementing Workflow Systems....Pages 61-72
Front Matter....Pages 73-73
Multiphase Damage Confinement System for Databases....Pages 75-87
Analyzing Transaction Logs for Effective Damage Assessment....Pages 89-101
Deductive Database Security....Pages 103-114
Front Matter....Pages 115-115
Towards Secure XML Federations....Pages 117-131
Secure XML Views....Pages 133-146
Distributed Cooperative Updates of XML Documents....Pages 147-159
Front Matter....Pages 161-161
On Security and Privacy Risks in Association Mining Algorithms....Pages 163-174
Mining Malicious Corruption of Data with Hidden Markov Models....Pages 175-189
A Study of Inference Problems in Distributed Databases....Pages 191-204
Front Matter....Pages 205-205
Uniform Indexing for Geospatial Data and Authorizations....Pages 207-218
Access Control of SVG Documents....Pages 219-230
Front Matter....Pages 231-231
On Modeling Computer Networks for Vulnerability Analysis....Pages 233-244
On-Line Intrusion Protection by Detecting Attacks with Diversity....Pages 245-256
Front Matter....Pages 257-257
Recertification: A Technique to Improve Services in PKI....Pages 259-270
Front Matter....Pages 257-257
A Hybrid PKI Model: Application to Secure Mediation....Pages 271-282
Front Matter....Pages 283-283
Implementation and Verification of Programmable Security....Pages 285-299
A Process Algebraic Approach to Security Policies....Pages 301-312
Anonymous and Secure Multicast Subscription....Pages 313-327
Front Matter....Pages 329-329
Privacy and Civil Liberties....Pages 331-346
....
Download the book Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen