Skip to content

Research Directions in Data and Applications Security XVIII

Spend $50 to get a free movie!

ISBN-10: 1402081278

ISBN-13: 9781402081279

Edition: 2004

Authors: Csilla Farkas, Pierangela Samarati

List price: $179.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems. Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include: -Database theory; -Inference control; -Data protection techniques; -Distributed systems; -Access control models; -Security policy; -Design and…    
Customers also bought

Book details

List price: $179.99
Copyright year: 2004
Publisher: Springer
Publication date: 7/15/2004
Binding: Hardcover
Pages: 385
Size: 6.25" wide x 9.25" long x 1.00" tall
Weight: 1.386
Language: English

Preface
Conference Organization
Contributing Authors
Invited Talk
Invited Talk - Inference Control Problem in Statistical Database Query Systems
Access Control. Attribute Mutability in Usage Control
Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations
An Extended Analysis of Delegating Obligations
Implementing Real-Time Update of Access Control Policies
Data Protection Techniques
Defending against Additive Attacks with Maximal Errors in Watermarking Relational Databases
Performances-Conscious Key Management in Encrypted Databases
Damage Discovery in Distributed Database Systems
Database Theory and Inference Control
Information Flow Analysis for File Systems and Databases Using Labels
Refusal in Incomplete Databases
Why is This User Asking so Many Questions? Explaining Sequences of Queries
System Security Analysis
RBAC/MAC Security for UML
Bridges: A Means to Conduct Secure Teleconferences over Public Telephones
Access Control Design and Management
Policy-based Security Management for Enterprise Systems
Pattern System for Access Control
Design for Parameterized Roles
Distributed Systems
Efficient Verification of Delegation in Distributive Group Membership Management
Web Resource Usage Control in RSCLP
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation
Privacy
On the Damage and Compensation of Privacy Leakage
Experimental Study of Distortion-Based Techniques for Association Rule Hiding
Privacy-Preserving Multi-Party Decision Tree Induction
Network Protection and Configuration. Configuring Storage Area Networks for Mandatory Security
Framework for Trusted Wireless Networks
Author Index