Ebook: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK
- Tags: Theory of Computation, Data Structures Cryptology and Information Theory, Computer Communication Networks, Information Storage and Retrieval
- Series: IFIP — The International Federation for Information Processing 128
- Year: 2003
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include:
-Role-Based Access Control;
-Database Security;
-XML Security;
-Data Mining and Inference;
-Multimedia System Security;
-Network Security;
-Public Key Infrastructure;
-Formal Methods and Protocols;
-Security and Privacy.
Content:
Front Matter....Pages i-xix
Front Matter....Pages 1-1
Shielding RBAC Infrastructures from Cyberterrorism....Pages 3-14
Privilege Administration for the Role Graph Model....Pages 15-25
Implementing RBAC Policies....Pages 27-36
Role Delegation for a Resource-Based Security Model....Pages 37-48
Using X.509 Attribute Certificates for Role-Based EAM....Pages 49-60
Implementing Workflow Systems....Pages 61-72
Front Matter....Pages 73-73
Multiphase Damage Confinement System for Databases....Pages 75-87
Analyzing Transaction Logs for Effective Damage Assessment....Pages 89-101
Deductive Database Security....Pages 103-114
Front Matter....Pages 115-115
Towards Secure XML Federations....Pages 117-131
Secure XML Views....Pages 133-146
Distributed Cooperative Updates of XML Documents....Pages 147-159
Front Matter....Pages 161-161
On Security and Privacy Risks in Association Mining Algorithms....Pages 163-174
Mining Malicious Corruption of Data with Hidden Markov Models....Pages 175-189
A Study of Inference Problems in Distributed Databases....Pages 191-204
Front Matter....Pages 205-205
Uniform Indexing for Geospatial Data and Authorizations....Pages 207-218
Access Control of SVG Documents....Pages 219-230
Front Matter....Pages 231-231
On Modeling Computer Networks for Vulnerability Analysis....Pages 233-244
On-Line Intrusion Protection by Detecting Attacks with Diversity....Pages 245-256
Front Matter....Pages 257-257
Recertification: A Technique to Improve Services in PKI....Pages 259-270
Front Matter....Pages 257-257
A Hybrid PKI Model: Application to Secure Mediation....Pages 271-282
Front Matter....Pages 283-283
Implementation and Verification of Programmable Security....Pages 285-299
A Process Algebraic Approach to Security Policies....Pages 301-312
Anonymous and Secure Multicast Subscription....Pages 313-327
Front Matter....Pages 329-329
Privacy and Civil Liberties....Pages 331-346
Content:
Front Matter....Pages i-xix
Front Matter....Pages 1-1
Shielding RBAC Infrastructures from Cyberterrorism....Pages 3-14
Privilege Administration for the Role Graph Model....Pages 15-25
Implementing RBAC Policies....Pages 27-36
Role Delegation for a Resource-Based Security Model....Pages 37-48
Using X.509 Attribute Certificates for Role-Based EAM....Pages 49-60
Implementing Workflow Systems....Pages 61-72
Front Matter....Pages 73-73
Multiphase Damage Confinement System for Databases....Pages 75-87
Analyzing Transaction Logs for Effective Damage Assessment....Pages 89-101
Deductive Database Security....Pages 103-114
Front Matter....Pages 115-115
Towards Secure XML Federations....Pages 117-131
Secure XML Views....Pages 133-146
Distributed Cooperative Updates of XML Documents....Pages 147-159
Front Matter....Pages 161-161
On Security and Privacy Risks in Association Mining Algorithms....Pages 163-174
Mining Malicious Corruption of Data with Hidden Markov Models....Pages 175-189
A Study of Inference Problems in Distributed Databases....Pages 191-204
Front Matter....Pages 205-205
Uniform Indexing for Geospatial Data and Authorizations....Pages 207-218
Access Control of SVG Documents....Pages 219-230
Front Matter....Pages 231-231
On Modeling Computer Networks for Vulnerability Analysis....Pages 233-244
On-Line Intrusion Protection by Detecting Attacks with Diversity....Pages 245-256
Front Matter....Pages 257-257
Recertification: A Technique to Improve Services in PKI....Pages 259-270
Front Matter....Pages 257-257
A Hybrid PKI Model: Application to Secure Mediation....Pages 271-282
Front Matter....Pages 283-283
Implementation and Verification of Programmable Security....Pages 285-299
A Process Algebraic Approach to Security Policies....Pages 301-312
Anonymous and Secure Multicast Subscription....Pages 313-327
Front Matter....Pages 329-329
Privacy and Civil Liberties....Pages 331-346
....
Download the book Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)