default search action
18. DBSec 2004: Sitges, Catalonia, Spain
- Csilla Farkas, Pierangela Samarati:
Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain. IFIP 144, Kluwer/Springer 2004, ISBN 1-4020-8127-8
Invited Talk I
- Lawrence H. Cox:
Invited Talk - Inference Control Problems in Statistical Database Query Systems. 1-13
Access Control
- Jaehong Park, Xinwen Zhang, Ravi S. Sandhu:
Attribute Mutability in Usage Control. 15-29 - Vijayalakshmi Atluri, Qi Guo:
STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. 31-47 - Andreas Schaad:
An Extended Analysis of Delegating Obligations. 49-64 - Indrakshi Ray, Tai Xin:
Implementing Real-Time Update of Access Control Policies. 65-80
Data Protection Techniques
- Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. 81-94 - Hakan Hacigümüs, Sharad Mehrotra:
Performance-Conscious Key Management in Encrypted Databases. 95-109 - Yanjun Zuo, Brajendra Panda:
Damage Discovery in Distributed Database Systems. 111-123
Database Theory and Inference Control
- Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce:
Information Flow Analysis for File Systems and Databases Using Labels. 125-141 - Joachim Biskup, Torben Weibert:
Refusal in Incomplete Databases. 143-157 - Aybar C. Acar, Amihai Motro:
Why Is this User Asking so Many Questions? Explaining Sequences of Queries. 159-176
Invited Talk II
- Ernesto Damiani, Sabrina De Capitani di Vimercati:
Invited Talk - Towards Semantics-Aware Access Control. 177-188
System Security Analysis
- Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting:
RBAC/MAC Security Analysis and Design for UML. 189-203 - Inja Youn, Duminda Wijesekera:
Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. 205-218
Access Control Design and Management
- Ravi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley:
Policy-based Security Management for Enterprise Systems. 219-233 - Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul:
A Pattern System for Access Control. 235-249 - Mei Ge, Sylvia L. Osborn:
A Design for Parameterized Roles. 251-264
Distributed Systems
- Ladislav Huraj, Helmut Reiser:
Efficient Verification of Delegation in Distributed Group Membership Management. 265-280 - Steve Barker:
Web Resource Usage Control in RSCLP. 281-294 - Indrajit Ray, Tomas Hajek:
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. 295-309
Privacy
- Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen:
On The Damage and Compensation of Privacy Leakage. 311-324 - Emmanuel D. Pontikakis, Achilleas A. Tsitsonis, Vassilios S. Verykios:
An Experimental Study of Distortion-Based Techniques for Association Rule Hiding. 325-339 - Justin Zhijun Zhan, LiWu Chang, Stan Matwin:
Privacy-Preserving Multi-Party Decision Tree Induction. 341-355
Network Protection and Configuration
- Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:
Configuring Storage Area Networks for Mandatory Security. 357-370 - Joon S. Park, Abhishek Jain:
A Framework for Trusted Wireless Sensor Networks. 371-384
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.