Book Volume 4602 2007

Data and Applications Security XXI

21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings


ISBN: 978-3-540-73533-5 (Print) 978-3-540-73538-0 (Online)

Table of contents (20 chapters)

  1. Front Matter

    Pages -

  2. Secure Query Evaluation

    1. Chapter

      Pages 1-13

      Confidentiality Policies for Controlled Query Evaluation

    2. Chapter

      Pages 14-30

      Provably-Secure Schemes for Basic Query Support in Outsourced Databases

    3. Chapter

      Pages 31-46

      Authenticated Relational Tables and Authenticated Skip Lists

  3. Location-Based Security/Mobile Security

    1. Chapter

      Pages 47-60

      Location Privacy Protection Through Obfuscation-Based Techniques

    2. Chapter

      Pages 61-76

      Efficient Security Policy Enforcement in a Location Based Service Environment

    3. Chapter

      Pages 77-92

      Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments

  4. Short Papers

    1. Chapter

      Pages 93-94

      Privacy-Preserving Schema Matching Using Mutual Information

    2. Chapter

      Pages 95-97

      The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers

  5. Distributed Security Issues

    1. Chapter

      Pages 98-112

      Measuring the Overall Security of Network Configurations Using Attack Graphs

    2. Chapter

      Pages 113-128

      Enforcing Honesty in Assured Information Sharing Within a Distributed System

    3. Chapter

      Pages 129-143

      A Privacy-Enhanced Attribute-Based Access Control System

  6. Cryptographic-Based Security

    1. Chapter

      Pages 144-160

      A Scalable and Secure Cryptographic Service

    2. Chapter

      Pages 161-176

      gVault: A Gmail Based Cryptographic Network File System

    3. Chapter

      Pages 177-194

      Design and Analysis of Querying Encrypted Data in Relational Databases

  7. Temporal Access Control and Usage Control

    1. Chapter

      Pages 195-210

      Dynamic Event-Based Access Control as Term Rewriting

    2. Chapter

      Pages 211-226

      A Spatio-temporal Role-Based Access Control Model

    3. Chapter

      Pages 227-242

      Towards a Times-Based Usage Control Model

  8. System Security Issues

    1. Chapter

      Pages 243-258

      New Paradigm of Inference Control with Trusted Computing

    2. Chapter

      Pages 259-274

      Security Patterns for Physical Access Control Systems

    3. Chapter

      Pages 275-290

      XACML Policies for Exclusive Resource Usage

  9. Back Matter

    Pages -