default search action
23. DBSec 2009: Montreal, Canada
- Ehud Gudes, Jaideep Vaidya:
Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings. Lecture Notes in Computer Science 5645, Springer 2009, ISBN 978-3-642-03006-2
Database Security I
- Joachim Biskup, Jens Seiler, Torben Weibert:
Controlled Query Evaluation and Inference-Free View Updates. 1-16 - Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett:
Implementing Reflective Access Control in SQL. 17-32
Security Policies
- Simon N. Foley, William M. Fitzgerald:
An Approach to Security Policy Configuration Using Semantic Threat Graphs. 33-48 - Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:
Reaction Policy Model Based on Dynamic Organizations and Threat Context. 49-64 - Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn:
Towards System Integrity Protection with Graph-Based Policy Analysis. 65-80
Privacy I
- Keith B. Frikken:
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. 81-94 - Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sandikkaya, Bart De Decker, Hans Vangheluwe:
Privacy-Preserving Telemonitoring for eHealth. 95-110
Intrusion Detection and Protocols
- Yermek Nugmanov, Brajendra Panda, Yi Hu:
Analysis of Data Dependency Based Intrusion Detection System. 111-125 - Xiaofeng Yang, Mohammad Zulkernine:
Secure Method Calls by Instrumenting Bytecode with Aspects. 126-141
Access Control
- Christoph Sturm, Ela Hunt, Marc H. Scholl:
Distributed Privilege Enforcement in PACS. 142-158 - Heechang Shin, Vijayalakshmi Atluri:
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. 159-174 - Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi:
Using Edit Automata for Rewriting-Based Security Enforcement. 175-190
Privacy II
- Pawel Jurczyk, Li Xiong:
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers. 191-207 - Bechara al Bouna, Richard Chbeir:
Detecting Inference Channels in Private Multimedia Data via Social Networks. 208-224
Database Security II
- Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. 225-239 - Wolter Pieters, Qiang Tang:
Data Is Key: Introducing the Data-Based Access Control Paradigm. 240-251
Trusted Computing
- Stephen R. Tate, Roopa Vishwanathan:
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology. 252-267 - Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu:
PAES: Policy-Based Authority Evaluation Scheme. 268-282
Short Papers
- Solomon Berhe, Steven A. Demurjian, Thomas Agresta:
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. 283-290 - Ehud Gudes, Nurit Gal-Oz, Alon Grubshtein:
Methods for Computing Trust and Reputation While Preserving Privacy. 291-298 - Olivier Sarrouy, Eric Totel, Bernard Jouga:
Building an Application Data Behavior Model for Intrusion Detection. 299-306 - Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray:
A Trust-Based Access Control Model for Pervasive Computing Applications. 307-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.