Data and Applications Security XVII: Status and Prospects

Free Download

Authors:

ISBN: 1402080700

Size: 11 MB (11016241 bytes)

Pages: 428/428

File format:

Language:

Publishing Year:

Category:

de Capitani di Vimercati S.1402080700

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats.

Table of contents :
Team DDU……Page 1
Table Of Content……Page 6
Contributing Authors……Page 10
Preface……Page 22
Conference Committees……Page 24
PART ONE Information Warfare……Page 26
Remote Computer Fingerprinting for Cyber Crime Investigations……Page 28
Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases……Page 41
PART TWO Information Assurance……Page 56
Delivering Services with Integrity Guarantees in Survivable Database Systems……Page 58
Certifying Data from Multiple Sources……Page 72
Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model……Page 86
Adapting Query Optimization Techniques for Efficient Alert Correlation……Page 100
PART THREE Security and Privacy……Page 114
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases……Page 116
Privacy under Conditions of Concurrent Interaction with Multiple Parties……Page 130
Correlated Data Inference……Page 144
Anti-Tamper Databases: Querying Encrypted Databases……Page 158
PART FOUR Authorization and Access Control in Distributed Systems Administration Rights in the SDSD-System……Page 174
Secure Authorisation for Web Services……Page 188
A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities……Page 201
Supporting Delegation in Secure Workflow Management Systems……Page 215
PART FIVE Security Technologies for the Internet……Page 228
Modifying LDAP to Support PKI……Page 230
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure……Page 240
Semantics-Aware Perimeter Protection……Page 254
Systematic Development of a Family of Fair Exchange Protocols……Page 268
PART SIX Access Control Models and Technologies……Page 284
High-speed Access Control for XML Documents……Page 286
Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses……Page 300
RBAC Policy Implementation for SQL Databases……Page 313
An Administrative Model for Role Graphs……Page 327
Safety and Liveness for an RBAC/MAC Security Model……Page 341
Schema Based XML Security: RBAC Approach……Page 355
Persistent versus Dynamic Role Membership……Page 369
FlexFlow: A Flexible Flow Control Policy Specification Framework……Page 383
PART SEVEN Key Note……Page 398
Data and Applications Security: Past, Present and the Future……Page 400
PART EIGHT Panel……Page 416
Digital Forensics: Operational, Legal, and Research Issues……Page 418

Reviews

There are no reviews yet.

Be the first to review “Data and Applications Security XVII: Status and Prospects”
Shopping Cart
Scroll to Top