Cargando…

Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings /

For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Damiani, Ernesto (Editor ), Liu, Peng (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 4127
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-36799-4
003 DE-He213
005 20220115083050.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 |a 9783540367994  |9 978-3-540-36799-4 
024 7 |a 10.1007/11805588  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Data and Applications Security XX  |h [electronic resource] :  |b 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings /  |c edited by Ernesto Damiani, Peng Liu. 
250 |a 1st ed. 2006. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2006. 
300 |a X, 319 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 4127 
505 0 |a Creating Objects in the Flexible Authorization Framework -- Detection and Resolution of Anomalies in Firewall Policy Rules -- On Finding an Inference-Proof Complete Database for Controlled Query Evaluation -- Consolidating the Access Control of Composite Applications and Workflows -- Authenticating Multi-dimensional Query Results in Data Publishing -- Xml Streams Watermarking -- Aggregation Queries in the Database-As-a-Service Model -- Policy Classes and Query Rewriting Algorithm for XML Security Views -- Interactive Analysis of Attack Graphs Using Relational Queries -- Notarized Federated Identity Management for Web Services -- Resolving Information Flow Conflicts in RBAC Systems -- Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems -- Term Rewriting for Access Control -- Discretionary and Mandatory Controls for Role-Based Administration -- A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach -- Enhancing User Privacy Through Data Handling Policies -- Efficient Enforcement of Security Policies Based on Tracking of Mobile Users -- A Framework for Flexible Access Control in Digital Library Systems -- Authrule: A Generic Rule-Based Authorization Module -- Aspect-Oriented Risk Driven Development of Secure Applications -- From Business Process Choreography to Authorization Policies -- Information Theoretical Analysis of Two-Party Secret Computation. 
520 |a For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of the change that has occurred in our ?eld. Once considered afterthoughts in systems and application design, data protection, privacy and trust have become the key problems of our day. This central role of security in the information society has however brought increased responsibilities to the research community. - day practitioners and researchers alike need to ?nd new ways to cope with the increasing scale and complexity of the security problems that must be solved on the global information infrastructure. Like the previous conference, the 20th DBSEC has proved to be up to this challenge. DBSEC 2006 received 56 submissions, out of which the program committee selected22 high-qualitypaperscoveringanumber of diverseresearchtopicssuch as access control, privacy, and identity management. We are glad to see that the ?nal program contains a well-balanced mix of theoretical results and practical prototype systems, many of them converging and building o? each other. Also, the DBSEC program includes a number of papers on new, emerging aspects of security research. Putting together a top-level conference like DBSEC is always a team e?ort. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer networks . 
650 0 |a Operating systems (Computers). 
650 0 |a Electronic data processing-Management. 
650 0 |a Algorithms. 
650 0 |a Computers, Special purpose. 
650 1 4 |a Cryptology. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Operating Systems. 
650 2 4 |a IT Operations. 
650 2 4 |a Algorithms. 
650 2 4 |a Special Purpose and Application-Based Systems. 
700 1 |a Damiani, Ernesto.  |e editor.  |0 (orcid)0000-0002-9557-6496  |1 https://orcid.org/0000-0002-9557-6496  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Liu, Peng.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540827160 
776 0 8 |i Printed edition:  |z 9783540367963 
830 0 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 4127 
856 4 0 |u https://doi.uam.elogim.com/10.1007/11805588  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)