Online Library TheLib.net » Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain
cover of the book Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain

Ebook: Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain

00
27.01.2024
0
0

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include:
-Database theory;
-Inference control;
-Data protection techniques;
-Distributed systems;
-Access control models;
-Security policy;
-Design and management;
-Privacy;
-Network security.

This book is the eighteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It contains twenty-three papers and two invited talks that were presented at the Eighteenth Annual IFIP WG 11.3 Conference on Data and Applications Security, which was sponsored by IFIP and held in Sitges, Catalonia, Spain in July 2004.

Research Directions in Data and Applications Security XVIII is a high-quality reference volume that addresses several aspects of information protection, and is aimed at researchers, educators, students, and developers.




As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include:
-Database theory;
-Inference control;
-Data protection techniques;
-Distributed systems;
-Access control models;
-Security policy;
-Design and management;
-Privacy;
-Network security.

This book is the eighteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It contains twenty-three papers and two invited talks that were presented at the Eighteenth Annual IFIP WG 11.3 Conference on Data and Applications Security, which was sponsored by IFIP and held in Sitges, Catalonia, Spain in July 2004.

Research Directions in Data and Applications Security XVIII is a high-quality reference volume that addresses several aspects of information protection, and is aimed at researchers, educators, students, and developers.




As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include:
-Database theory;
-Inference control;
-Data protection techniques;
-Distributed systems;
-Access control models;
-Security policy;
-Design and management;
-Privacy;
-Network security.

This book is the eighteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It contains twenty-three papers and two invited talks that were presented at the Eighteenth Annual IFIP WG 11.3 Conference on Data and Applications Security, which was sponsored by IFIP and held in Sitges, Catalonia, Spain in July 2004.

Research Directions in Data and Applications Security XVIII is a high-quality reference volume that addresses several aspects of information protection, and is aimed at researchers, educators, students, and developers.


Content:
Front Matter....Pages i-xii
Invited Talk - Inference Control Problems in Statistical Database Query Systems....Pages 1-13
Attribute Mutability in Usage Control....Pages 15-29
Star-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations....Pages 31-47
An Extended Analysis of Delegating Obligations....Pages 49-64
Implementing Real-Time Update of Access Control Policies....Pages 65-80
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases....Pages 81-94
Performance-Conscious Key Management in Encrypted Databases....Pages 95-109
Damage Discovery in Distributed Database Systems....Pages 111-123
Information Flow Analysis for File Systems and Databases Using Labels....Pages 125-141
Refusal in Incomplete Databases....Pages 143-157
Why is This User Asking So Many Questions? Explaining Sequences of Queries....Pages 159-176
Invited Talk - Towards Semantics-Aware Access Control....Pages 177-188
RBAC/MAC Security for UML....Pages 189-203
Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephones....Pages 205-218
Policy-Based Security Management for Enterprise Systems....Pages 219-233
A Pattern System for Access Control....Pages 235-249
A Design for Parameterized Roles....Pages 251-264
Efficient Verification of Delegation in Distributed Group Membership Management....Pages 265-280
Web Resource Usage Control in RSCLP....Pages 281-294
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation....Pages 295-309
On the Damage and Compensation of Privacy Leakage....Pages 311-324
An Experimental Study of Distortion-Based Techniques for Association Rule Hiding....Pages 325-339
Privacy-Preserving Multi-Party Decision Tree Induction....Pages 341-355
Configuring Storage-Area Networks for Mandatory Security....Pages 357-370
A Framework for Trusted Wireless Sensor Networks....Pages 371-384
Back Matter....Pages 385-385


As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include:
-Database theory;
-Inference control;
-Data protection techniques;
-Distributed systems;
-Access control models;
-Security policy;
-Design and management;
-Privacy;
-Network security.

This book is the eighteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It contains twenty-three papers and two invited talks that were presented at the Eighteenth Annual IFIP WG 11.3 Conference on Data and Applications Security, which was sponsored by IFIP and held in Sitges, Catalonia, Spain in July 2004.

Research Directions in Data and Applications Security XVIII is a high-quality reference volume that addresses several aspects of information protection, and is aimed at researchers, educators, students, and developers.


Content:
Front Matter....Pages i-xii
Invited Talk - Inference Control Problems in Statistical Database Query Systems....Pages 1-13
Attribute Mutability in Usage Control....Pages 15-29
Star-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations....Pages 31-47
An Extended Analysis of Delegating Obligations....Pages 49-64
Implementing Real-Time Update of Access Control Policies....Pages 65-80
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases....Pages 81-94
Performance-Conscious Key Management in Encrypted Databases....Pages 95-109
Damage Discovery in Distributed Database Systems....Pages 111-123
Information Flow Analysis for File Systems and Databases Using Labels....Pages 125-141
Refusal in Incomplete Databases....Pages 143-157
Why is This User Asking So Many Questions? Explaining Sequences of Queries....Pages 159-176
Invited Talk - Towards Semantics-Aware Access Control....Pages 177-188
RBAC/MAC Security for UML....Pages 189-203
Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephones....Pages 205-218
Policy-Based Security Management for Enterprise Systems....Pages 219-233
A Pattern System for Access Control....Pages 235-249
A Design for Parameterized Roles....Pages 251-264
Efficient Verification of Delegation in Distributed Group Membership Management....Pages 265-280
Web Resource Usage Control in RSCLP....Pages 281-294
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation....Pages 295-309
On the Damage and Compensation of Privacy Leakage....Pages 311-324
An Experimental Study of Distortion-Based Techniques for Association Rule Hiding....Pages 325-339
Privacy-Preserving Multi-Party Decision Tree Induction....Pages 341-355
Configuring Storage-Area Networks for Mandatory Security....Pages 357-370
A Framework for Trusted Wireless Sensor Networks....Pages 371-384
Back Matter....Pages 385-385
....
Download the book Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen