E-Book, Englisch, Band 128, 350 Seiten, eBook
Reihe: IFIP International Federation for Information Processing
Gudes / Shenoi Research Directions in Data and Applications Security
Erscheinungsjahr 2013
ISBN: 978-0-387-35697-6
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK
E-Book, Englisch, Band 128, 350 Seiten, eBook
Reihe: IFIP International Federation for Information Processing
ISBN: 978-0-387-35697-6
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
I Role-Based Access Control.- 1 Shielding RBAC Infrastructures from Cyberterrorism.- 2 Privilege Administration for the Role Graph Model.- 3 Implementing RBAC Policies.- 4 Role Delegation for a Resource-Based Security Model.- 5 Using X.509 Attribute Certificates for Role-Based EAM.- 6 Implementing Workflow Systems.- II Database Security.- 7 Multiphase Damage Confinement System for Databases.- 8 Analyzing Transaction Logs for Effective Damage Assessment.- 9 Deductive Database Security.- III XML Security.- 10 Towards Secure XML Federations.- 11 Secure XML Views.- 12 Distributed Cooperative Updates of XML Documents.- IV Data Mining and Inference.- 13 On Security and Privacy Risks in Association Mining Algorithms.- 14 Mining Malicious Corruption of Data with Hidden Markov Models.- 15 A Study of Inference Problems in Distributed Databases.- V Multimedia System Security.- 16 Uniform Indexing for Geospatial Data and Authorizations.- 17 Access Control of SVG Documents.- VI Network Security.- 18 On Modeling Computer Networks for Vulnerability Analysis.- 19 On-line Intrusion Protection by Detecting Attacks with Diversity.- VII Public Key Infrastructure.- 20 Recertification: A Technique to Improve Services in PKI.- 21 A Hybrid PKI Model: Application to Secure Mediation.- VIII Formal Methods and Protocols.- 22 Implementation and Verification of Programmable Security.- 23 A Process Algebraic Approach to Security Policies.- 24 Anonymous and Secure Multicast Subscription.- IX Security and Privacy.- 25 Privacy and Civil Liberties.