Data and Applications Security XX

20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings

  • Ernesto Damiani
  • Peng Liu
Conference proceedings DBSec 2006

DOI: 10.1007/11805588

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4127)

Table of contents (22 papers)

  1. Front Matter
  2. Creating Objects in the Flexible Authorization Framework
    Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
    Pages 1-14
  3. Detection and Resolution of Anomalies in Firewall Policy Rules
    Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham
    Pages 15-29
  4. Consolidating the Access Control of Composite Applications and Workflows
    Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz
    Pages 44-59
  5. Authenticating Multi-dimensional Query Results in Data Publishing
    Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan
    Pages 60-73
  6. Xml Streams Watermarking
    Julien Lafaye, David Gross-Amblard
    Pages 74-88
  7. Aggregation Queries in the Database-As-a-Service Model
    Einar Mykletun, Gene Tsudik
    Pages 89-103
  8. Interactive Analysis of Attack Graphs Using Relational Queries
    Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
    Pages 119-132
  9. Notarized Federated Identity Management for Web Services
    Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
    Pages 133-147
  10. Resolving Information Flow Conflicts in RBAC Systems
    Noa Tuval, Ehud Gudes
    Pages 148-162
  11. Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
    Saket Kaushik, William Winsborough, Duminda Wijesekera, Paul Ammann
    Pages 163-178
  12. Term Rewriting for Access Control
    Steve Barker, Maribel Fernández
    Pages 179-193
  13. A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach
    Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari
    Pages 209-223
  14. Enhancing User Privacy Through Data Handling Policies
    C. A. Ardagna, S. De Capitani di Vimercati, P. Samarati
    Pages 224-236
  15. Efficient Enforcement of Security Policies Based on Tracking of Mobile Users
    Vijayalakshmi Atluri, Heechang Shin
    Pages 237-251
  16. A Framework for Flexible Access Control in Digital Library Systems
    Indrajit Ray, Sudip Chakraborty
    Pages 252-266
  17. Authrule: A Generic Rule-Based Authorization Module
    Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe
    Pages 267-281

About these proceedings


For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of the change that has occurred in our ?eld. Once considered afterthoughts in systems and application design, data protection, privacy and trust have become the key problems of our day. This central role of security in the information society has however brought increased responsibilities to the research community. - day practitioners and researchers alike need to ?nd new ways to cope with the increasing scale and complexity of the security problems that must be solved on the global information infrastructure. Like the previous conference, the 20th DBSEC has proved to be up to this challenge. DBSEC 2006 received 56 submissions, out of which the program committee selected22 high-qualitypaperscoveringanumber of diverseresearchtopicssuch as access control, privacy, and identity management. We are glad to see that the ?nal program contains a well-balanced mix of theoretical results and practical prototype systems, many of them converging and building o? each other. Also, the DBSEC program includes a number of papers on new, emerging aspects of security research. Putting together a top-level conference like DBSEC is always a team e?ort.


Administration Information Registry Resolution Semantic Web XML algorithm algorithms authentication integrity maintenance privacy risk management secure information integration security security planning and administration

Editors and affiliations

  • Ernesto Damiani
    • 1
  • Peng Liu
    • 2
  1. 1.Dipartimento di Tecnologie dell’InformazioneUniversità degli Studi di Milano 
  2. 2.The Logistics InstituteNortheastern UniversityShenyangChina

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-36796-3
  • Online ISBN 978-3-540-36799-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349