default search action
17. DBSec 2003: Estes Park, Colorado, USA
- Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray:
Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA. IFIP 142, Kluwer/Springer 2004, ISBN 1-4020-8069-7
Information Warfare
- Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi:
Remote Computer Fingerprinting for Cyber Crime Investigations. 3-15 - Prahalad Ragothaman, Brajendra Panda:
Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases. 16-30
Information Assurance
- Jianyong Zhang, Peng Liu:
Delivering Services with Integrity Guarantees in Survivable Database Systems. 33-46 - Glen Nuckolls, Charles U. Martel, Stuart G. Stubblebine:
Certifying Data from Multiple Sources. 47-60 - Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra:
Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model. 61-74 - Peng Ning, Dingbang Xu:
Adapting Query Optimization Techniques for Efficient Alert Correlation. 75-88
Security and Privacy
- Ehud Gudes, Boris Rozenberg:
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases. 91-104 - Martin S. Olivier:
Privacy under Conditions of Concurrent Interaction with Multiple Parties. 105-118 - Csilla Farkas, Andrei Stoica:
Correlated Data Inference. 119-132 - Gultekin Özsoyoglu, David A. Singer, Sun S. Chung:
Anti-Tamper Databases: Querying Encrypted Databases. 133-146
Authorization and Access Control in Distributed Systems
- Joachim Biskup, Thomas Leineweber, Joerg Parthe:
Administration Rights in the SDSD-System. 149-162 - Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi:
Secure Authorisation for Web Services. 163-175 - Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. 176-189 - Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni:
Supporting Delegation in Secure Workflow Management Systems. 190-202
Security Technologies for the Internet
- David W. Chadwick, Edward Ball, M. V. Sahalayev:
Modifying LDAP to Support PKI. 205-214 - Marco Cremonini, Ernesto Damiani, Pierangela Samarati:
Semantics-Aware Perimeter Protection. 229-242 - Paul D. Ezhilchelvan, Santosh K. Shrivastava:
Systematic Development of a Family of Fair Exchange Protocols. 243-258
Access Control Models and Technologies
- Jong P. Yoon:
High-speed Access Control for XML Documents. 261-274 - Tsau Young Lin:
Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses. 275-287 - Steve Barker, Paul Douglas:
RBAC Policy Implementation for SQL Databases. 288-301 - He Wang, Sylvia L. Osborn:
An Administrative Model for Role Graphs. 302-315 - Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Safety and Liveness for an RBAC/MAC Security Model. 316-329 - Xinwen Zhang, Jaehong Park, Ravi S. Sandhu:
Schema Based XML Security: RBAC Approach. 330-343 - Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody:
Persistent versus Dynamic Role Membership. 344-357 - Shiping Chen, Duminda Wijesekera, Sushil Jajodia:
FlexFlow: A Flexible Flow Control Policy Specification Framework. 358-371
Key Note
- Bhavani Thuraisingham:
Data and Applications Security: Past, Present and the Future. 375-390
Panel
- Mark Pollitt, Michael A. Caloyannides, Jon Novotny, Sujeet Shenoi:
Digital Forensics: Operational, Legal, and Research Issues. 393-403
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.