Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain

Pirmais vāks
Csilla Farkas, Pierangela Samarati
Springer, 2006. gada 11. apr. - 385 lappuses

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include:
-Database theory;
-Inference control;
-Data protection techniques;
-Distributed systems;
-Access control models;
-Security policy;
-Design and management;
-Privacy;
-Network security.

This book is the eighteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It contains twenty-three papers and two invited talks that were presented at the Eighteenth Annual IFIP WG 11.3 Conference on Data and Applications Security, which was sponsored by IFIP and held in Sitges, Catalonia, Spain in July 2004.

Research Directions in Data and Applications Security XVIII is a high-quality reference volume that addresses several aspects of information protection, and is aimed at researchers, educators, students, and developers.

No grāmatas satura

Atlasītās lappuses

Saturs

ACCESS CONTROL
14
PRIVACY
29
An Index Structure for Efficient Evaluation
31
An Extended Analysis of Delegating Obligations 49
48
Implementing RealTime Update of Access Control Policies
65
DATA PROTECTION TECHNIQUES
81
PerformanceConscious Key Management in Encrypted Databases
95
Damage Discovery in Distributed Database Systems
111
ACCESS CONTROL DESIGN AND MANAGEMENT
219
A Pattern System for Access Control 235
234
A Design for Parameterized Roles
251
DISTRIBUTED SYSTEMS
265
Web Resource Usage Control in RSCLP
281
Securely Distributing Centralized Multimedia Content
295
On The Damage and Compensation of Privacy Leakage DaWei Wang ChurnJung Liau Tsansheng Hsu and Jeremy K P Chen 311
310
An Experimental Study of DistortionBased Techniques
325

DATABASE THEORY AND INFERENCE CONTROL
124
Refusal in Incomplete Databases
143
Why Is this User Asking so Many Questions? 159
158
INVITED TALK II
177
SYSTEM SECURITY ANALYSIS
189
A Means to Conduct Secure
205
PrivacyPreserving MultiParty
341
NETWORK PROTECTION AND CONFIGURATION
356
A Framework for Trusted Wireless Sensor Networks Joon S Park and Abhishek Jain
371
Author Index
385
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Bibliogrāfiskā informācija