Data and Applications Security XIX

19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

Editors:

ISBN: 978-3-540-28138-2 (Print) 978-3-540-31937-5 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-15

    Streams, Security and Scalability

  3. No Access

    Book Chapter

    Pages 16-27

    Towards Privacy-Enhanced Authorization Policies and Languages

  4. No Access

    Book Chapter

    Pages 28-39

    Revocation of Obligation and Authorisation Policy Objects

  5. No Access

    Book Chapter

    Pages 40-53

    Role Slices: A Notation for RBAC Permission Assignment and Enforcement

  6. No Access

    Book Chapter

    Pages 54-68

    Designing Secure Indexes for Encrypted Databases

  7. No Access

    Book Chapter

    Pages 69-83

    Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases

  8. No Access

    Book Chapter

    Pages 84-98

    Verified Query Results from Hybrid Authentication Trees

  9. No Access

    Book Chapter

    Pages 99-113

    Multilevel Secure Teleconferencing over Public Switched Telephone Network

  10. No Access

    Book Chapter

    Pages 114-123

    Secrecy of Two-Party Secure Computation

  11. No Access

    Book Chapter

    Pages 124-138

    Reliable Scheduling of Advanced Transactions

  12. No Access

    Book Chapter

    Pages 139-152

    Privacy-Preserving Decision Trees over Vertically Partitioned Data

  13. No Access

    Book Chapter

    Pages 153-165

    Privacy-Preserving Collaborative Association Rule Mining

  14. No Access

    Book Chapter

    Pages 166-177

    Privacy-Preserving Distributed k-Anonymity

  15. No Access

    Book Chapter

    Pages 178-192

    Towards Database Firewalls

  16. No Access

    Book Chapter

    Pages 193-206

    Complete Redundancy Detection in Firewalls

  17. No Access

    Book Chapter

    Pages 207-221

    A Comprehensive Approach to Anomaly Detection in Relational Databases

  18. No Access

    Book Chapter

    Pages 222-236

    An Authorization Architecture for Web Services

  19. No Access

    Book Chapter

    Pages 237-251

    Secure Model Management Operations for the Web

  20. No Access

    Book Chapter

    Pages 252-266

    A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions

  21. No Access

    Book Chapter

    Pages 267-280

    Secure Mediation with Mobile Code

previous Page of 2