default search action
20. DBSec 2006: Sophia Antipolis, France
- Ernesto Damiani, Peng Liu:
Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings. Lecture Notes in Computer Science 4127, Springer 2006, ISBN 3-540-36796-9 - Nicola Zannone, Sushil Jajodia, Duminda Wijesekera:
Creating Objects in the Flexible Authorization Framework. 1-14 - Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham:
Detection and Resolution of Anomalies in Firewall Policy Rules. 15-29 - Joachim Biskup, Lena Wiese:
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. 30-43 - Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz:
Consolidating the Access Control of Composite Applications and Workflows. 44-59 - Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan:
Authenticating Multi-dimensional Query Results in Data Publishing. 60-73 - Julien Lafaye, David Gross-Amblard:
XML Streams Watermarking. 74-88 - Einar Mykletun, Gene Tsudik:
Aggregation Queries in the Database-As-a-Service Model. 89-103 - Nataliya Rassadko:
Policy Classes and Query Rewriting Algorithm for XML Security Views. 104-118 - Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Interactive Analysis of Attack Graphs Using Relational Queries. 119-132 - Michael T. Goodrich, Roberto Tamassia, Danfeng Yao:
Notarized Federated Identity Management for Web Services. 133-147 - Noa Tuval, Ehud Gudes:
Resolving Information Flow Conflicts in RBAC Systems. 148-162 - Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann:
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. 163-178 - Steve Barker, Maribel Fernández:
Term Rewriting for Access Control. 179-193 - Jason Crampton:
Discretionary and Mandatory Controls for Role-Based Administration. 194-208 - Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari:
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. 209-223 - Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Enhancing User Privacy Through Data Handling Policies. 224-236 - Vijayalakshmi Atluri, Heechang Shin:
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. 237-251 - Indrajit Ray, Sudip Chakraborty:
A Framework for Flexible Access Control in Digital Library Systems. 252-266 - Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe:
Authrule: A Generic Rule-Based Authorization Module. 267-281 - Geri Georg, Siv Hilde Houmb, Indrakshi Ray:
Aspect-Oriented Risk Driven Development of Secure Applications. 282-296 - Philip Robinson, Florian Kerschbaum, Andreas Schaad:
From Business Process Choreography to Authorization Policies. 297-309 - Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu:
Information Theoretical Analysis of Two-Party Secret Computation. 310-317
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.