20. DBSec 2006:
Sophia Antipolis,
France
Ernesto Damiani, Peng Liu (Eds.):
Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings.
Lecture Notes in Computer Science 4127 Springer 2006, ISBN 3-540-36796-9
- Nicola Zannone, Sushil Jajodia, Duminda Wijesekera:
Creating Objects in the Flexible Authorization Framework.
1-14
- Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham:
Detection and Resolution of Anomalies in Firewall Policy Rules.
15-29
- Joachim Biskup, Lena Wiese:
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.
30-43
- Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz:
Consolidating the Access Control of Composite Applications and Workflows.
44-59
- Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan:
Authenticating Multi-dimensional Query Results in Data Publishing.
60-73
- Julien Lafaye, David Gross-Amblard:
XML Streams Watermarking.
74-88
- Einar Mykletun, Gene Tsudik:
Aggregation Queries in the Database-As-a-Service Model.
89-103
- Nataliya Rassadko:
Policy Classes and Query Rewriting Algorithm for XML Security Views.
104-118
- Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Interactive Analysis of Attack Graphs Using Relational Queries.
119-132
- Michael T. Goodrich, Roberto Tamassia, Danfeng Yao:
Notarized Federated Identity Management for Web Services.
133-147
- Noa Tuval, Ehud Gudes:
Resolving Information Flow Conflicts in RBAC Systems.
148-162
- Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann:
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
163-178
- Steve Barker, Maribel Fernández:
Term Rewriting for Access Control.
179-193
- Jason Crampton:
Discretionary and Mandatory Controls for Role-Based Administration.
194-208
- Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari:
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.
209-223
- Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Enhancing User Privacy Through Data Handling Policies.
224-236
- Vijayalakshmi Atluri, Heechang Shin:
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users.
237-251
- Indrajit Ray, Sudip Chakraborty:
A Framework for Flexible Access Control in Digital Library Systems.
252-266
- Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe:
Authrule: A Generic Rule-Based Authorization Module.
267-281
- Geri Georg, Siv Hilde Houmb, Indrakshi Ray:
Aspect-Oriented Risk Driven Development of Secure Applications.
282-296
- Philip Robinson, Florian Kerschbaum, Andreas Schaad:
From Business Process Choreography to Authorization Policies.
297-309
- Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu:
Information Theoretical Analysis of Two-Party Secret Computation.
310-317
Copyright © Sun Mar 14 23:00:25 2010
by Michael Ley (ley@uni-trier.de)