Data and Applications Security XXII
Springer Berlin (Verlag)
978-3-540-70566-6 (ISBN)
Access Control.- Dynamic Meta-level Access Control in SQL.- On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model.- Audit and Logging.- A Unified Audit Expression Model for Auditing SQL Queries.- A New Approach to Secure Logging.- Keynote.- Security, Functionality and Scale?.- Privacy I.- P4A: A New Privacy Model for XML.- Privacy-Aware Collaborative Access Control in Web-Based Social Networks.- A Privacy-Preserving Ticketing System.- The Analysis of Windows Vista Disk Encryption Algorithm.- Shared and Searchable Encrypted Data for Untrusted Servers.- Secure Construction of Contingency Tables from Distributed Data.- Web Services Security: Techniques and Challenges (Extended Abstract).- Empirical Analysis of Certificate Revocation Lists.- Using New Tools for Certificate Repositories Generation in MANETs.- Privacy II.- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure.- Protecting the Publishing Identity in Multiple Tuples.- Panel Session: What Are the Key Challenges in Distributed Security?.- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services.- Sharing but Protecting Content Against Internal Leakage for Organisations.- Regulating Exceptions in Healthcare Using Policy Spaces.- Towards Automation of Testing High-Level Security Properties.- An Attack Graph-Based Probabilistic Security Metric.- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.- DIWeDa - Detecting Intrusions in Web Databases.- Securing Workflows with XACML, RDF and BPEL.
Erscheint lt. Verlag | 1.7.2008 |
---|---|
Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
Zusatzinfo | XI, 352 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 563 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | ACCESS • Access Control • Algorithm analysis and problem complexity • anonymity • Auditing • authentication • authorization • concurrency control • cryptography • Database Security • data publishing • disk encryption • Dynamic Analysis • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Inference Control • integrity maintenance • Intrusion Detection • MANETs • pervasive computin • Pervasive Computing • privacy • privacy map • Privacy Policy • public-key management • Risk Management • security • security assessment • security protocol • security testing • Signatures • Ticketing • trusted computing • Vulnerabilities • web application security • Web-based social networks |
ISBN-10 | 3-540-70566-X / 354070566X |
ISBN-13 | 978-3-540-70566-6 / 9783540705666 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich