Research directions in data and applications security: IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Kluwer
2003
|
Schriftenreihe: | International Federation for Information Processing
128 |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVII, 346 S. graph. Darst. |
ISBN: | 1402075413 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV025308455 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 100417s2003 d||| |||| 00||| eng d | ||
020 | |a 1402075413 |9 1-402-07541-3 | ||
035 | |a (OCoLC)834719646 | ||
035 | |a (DE-599)BVBBV025308455 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Research directions in data and applications security |b IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK |c ed. by Ehud Gudes |
264 | 1 | |a Boston [u.a.] |b Kluwer |c 2003 | |
300 | |a XVII, 346 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a IFIP |v 128 | |
700 | 1 | |a Gudes , Ehud |4 edt | |
830 | 0 | |a International Federation for Information Processing |t IFIP |v 128 |w (DE-604)BV025114763 |9 128 | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019939716&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-019939716 |
Datensatz im Suchindex
_version_ | 1804142380293554176 |
---|---|
adam_text | RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY IFIP TC11 / WG11.3
SIXTEENTH ANNUAL CONFERENCE ON DATA AND APPLICATIONS SECURITY JULY
28-37, 2002, CAMBRIDGE, UK EDITED BY EHUD GUDES BEN-GURION UNIVERSITY OF
THE NEGEV ISRAEL SUJEETSHENOI UNIVERSITY OF TULSA USA ICLUWER ACADEMIC
PUBLISHERS. BOSTON / DORDRECHT/ LONDON CONTENTS CONTRIBUTING AUTHORS IX
PREFACE XIX PART I ROLE-BASED ACCESS CONTROL 1 SHIELDING RBAC
INFRASTRUCTURES FROM CYBERTERRORISNI 3 ANDRDS BELOKOSZTOLSZKI AND DAVID
EYERS 2 PRIVILEGE ADMINISTRATION FOR THE ROLE GRAPH MODEL 15 CECILIA
IONITA AND SYLVIA OSBORN 3 IMPLEMENTING RBAC POLICIES 27 STEVE BARKER,
PAUL DOUGLAS AND TERRY FANNING 4 ROLE DELEGATION FOR A RESOURCE-BASED
SECURITY MODEL 37 M. LIEBRAND, H. ELLIS, C. PHILLIPS, S. DEMURJIAN, T.C.
TING AND J. ELLIS 5 USING X.509 ATTRIBUTE CERTIFICATES FOR ROLE-BASED
EAM 49 DONGWAN SHIN, GAIL-JOON AHN AND SANGRAE CHO 6 IMPLEMENTING
WORKFLOW SYSTEMS 61 LUCAS DREYER AND MARTIN OLIVIER PART II DATABASE
SECURITY . 7 MULTIPHASE DAMAGE CONFINEMENT SYSTEM FOR DATABASES 75 PENG
LIU AND YING WANG VI DATA AND APPLICATIONS SECURITY 8 ANALYZING
TRANSACTION LOGS FOR EFFECTIVE DAMAGE ASSESSMENT 89 PRAHALAD RAGOTHAMAN
AND BRAJENDRA PANDA 9 DEDUCTIVE DATABASE SECURITY 103 STEVE BARKER PART
III XML SECURITY 10 . TOWARDS SECURE XML FEDERATIONS 117 LINGYU WANG,
DUMINDA WIJESEKERA AND SUSHIL JAJODIA 11 SECURE XML VIEWS 133 ANDREI
STOICA AND CSILLA FARKAS 12 DISTRIBUTED COOPERATIVE UPDATES OF XML
DOCUMENTS 147 ELISA BERTINO, ELENA FERRARI AND GIOVANNI MELLA PART IV
DATA MINING AND INFERENCE 13 ON SECURITY AND PRIVACY RISKS IN
ASSOCIATION MINING ALGORITHMS 163 TOM JOHNSTEN, VIJAY RAGHAVAN AND KEVIN
HILL 14 MINING MALICIOUS CORRUPTION OF DATA WITH HIDDEN MARKOV MODELS
175 DANIEL BARBARA, RAJNI GOEL AND SUSHIL JAJODIA 15 A STUDY OF
INFERENCE PROBLEMS IN DISTRIBUTED DATABASES 191 LIWU CHANG AND IRA
MOSKOWITZ PART V MULTIMEDIA SYSTEM SECURITY 16 UNIFORM INDEXING FOR
GEOSPATIAL DATA AND AUTHORIZATIONS 207 VIJAYALAKSHMI ATLURI AND PIETRO
MAZZOLENI 17 ACCESS CONTROL OF SVG DOCUMENTS 219 E. DAMIANI, S. DE
CAPITANI DI VIMERCATI, E. FERNANDEZ-MEDINA AND P. SAMARATI CONTENTS VII
PART VI NETWORK SECURITY 18 ON MODELING COMPUTER NETWORKS FOR
VULNERABILITY ANALYSIS 233 C. CAMPBELL, J. DAWKINS, B. PALLET, K. FITCH,
J. HALE AND M. PAPA 19 ON-LINE INTRUSION PROTECTION BY DETECTING ATTACKS
WITH DIVERSITY 245 J. REYNOLDS, J. JUST, E. LAWSON, L. CLOUGH AND R.
MAGLICH PART VII PUBLIC KEY INFRASTRUCTURE 20 RECERTIFICATION: A
TECHNIQUE TO IMPROVE SERVICES IN PKI 259 RAVI MUKKAMALA, SATYAM DAS AND
MAHANTESH HALAPPANAVAR 21 A HYBRID PKI MODEL: APPLICATION TO SECURE
MEDIATION 271 JOACHIM BISKUP AND YIICEL KARABULUT PART VIII FORMAL
METHODS AND PROTOCOLS 22 IMPLEMENTATION AND VERIFICATION OF PROGRAMMABLE
SECURITY 285 STEPHEN MAGILL, BRADLEY SKAGGS, MAURICIO PAPA AND JOHN HALE
23 A PROCESS ALGEBRAIC APPROACH TO SECURITY POLICIES 301 PETER RYAN AND
RAGNI RYVOLD ARNESEN 24 ANONYMOUS AND SECURE MULTICAST SUBSCRIPTION 313
INDRAJIT RAY AND INDRAKSHI RAY PART IX SECURITY AND PRIVACY 25 PRIVACY
AND CIVIL LIBERTIES 331 D. CHADWICK, M. OLIVIER, P. SAMARATI, E.
SHARPSTON AND B. THURAISINGHAM
|
any_adam_object | 1 |
author2 | Gudes , Ehud |
author2_role | edt |
author2_variant | e g e eg |
author_facet | Gudes , Ehud |
building | Verbundindex |
bvnumber | BV025308455 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)834719646 (DE-599)BVBBV025308455 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01268nam a2200313 cb4500</leader><controlfield tag="001">BV025308455</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100417s2003 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1402075413</subfield><subfield code="9">1-402-07541-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)834719646</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV025308455</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research directions in data and applications security</subfield><subfield code="b">IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK</subfield><subfield code="c">ed. by Ehud Gudes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Kluwer</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 346 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IFIP</subfield><subfield code="v">128</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gudes , Ehud</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">International Federation for Information Processing </subfield><subfield code="t">IFIP</subfield><subfield code="v">128</subfield><subfield code="w">(DE-604)BV025114763</subfield><subfield code="9">128</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019939716&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-019939716</subfield></datafield></record></collection> |
id | DE-604.BV025308455 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:30:51Z |
institution | BVB |
isbn | 1402075413 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-019939716 |
oclc_num | 834719646 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | XVII, 346 S. graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Kluwer |
record_format | marc |
series | International Federation for Information Processing |
series2 | IFIP |
spelling | Research directions in data and applications security IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK ed. by Ehud Gudes Boston [u.a.] Kluwer 2003 XVII, 346 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier IFIP 128 Gudes , Ehud edt International Federation for Information Processing IFIP 128 (DE-604)BV025114763 128 GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019939716&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Research directions in data and applications security IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK International Federation for Information Processing |
title | Research directions in data and applications security IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK |
title_auth | Research directions in data and applications security IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK |
title_exact_search | Research directions in data and applications security IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK |
title_full | Research directions in data and applications security IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK ed. by Ehud Gudes |
title_fullStr | Research directions in data and applications security IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK ed. by Ehud Gudes |
title_full_unstemmed | Research directions in data and applications security IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK ed. by Ehud Gudes |
title_short | Research directions in data and applications security |
title_sort | research directions in data and applications security ifip tc11 wg11 3 sixteenth annual conference on data and applications security july 28 31 2002 cambridge uk |
title_sub | IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019939716&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV025114763 |
work_keys_str_mv | AT gudesehud researchdirectionsindataandapplicationssecurityifiptc11wg113sixteenthannualconferenceondataandapplicationssecurityjuly28312002cambridgeuk |