Data and Applications Security XXIII

23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings

  • Ehud Gudes
  • Jaideep Vaidya
Conference proceedings DBSec 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5645)

Table of contents

  1. Front Matter
  2. Database Security I

    1. Joachim Biskup, Jens Seiler, Torben Weibert
      Pages 1-16
    2. Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett
      Pages 17-32
  3. Security Policies

    1. Simon N. Foley, William M. Fitzgerald
      Pages 33-48
    2. Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens
      Pages 49-64
    3. Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
      Pages 65-80
  4. Privacy I

    1. Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sandıkkaya, Bart De Decker, Hans Vangheluwe
      Pages 95-110
  5. Intrusion Detection and Protocols

    1. Yermek Nugmanov, Brajendra Panda, Yi Hu
      Pages 111-125
    2. Xiaofeng Yang, Mohammad Zulkernine
      Pages 126-141
  6. Access Control

    1. Christoph Sturm, Ela Hunt, Marc H. Scholl
      Pages 142-158
    2. Heechang Shin, Vijayalakshmi Atluri
      Pages 159-174
    3. Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi
      Pages 175-190
  7. Privacy II

  8. Database Security II

    1. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
      Pages 225-239
    2. Wolter Pieters, Qiang Tang
      Pages 240-251
  9. Trusted Computing

    1. Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu
      Pages 268-282
  10. Short Papers

    1. Solomon Berhe, Steven Demurjian, Thomas Agresta
      Pages 283-290

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009.

The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing.

Keywords

access control anonymity auditing authentication authorization bytecode instrumentation code security cryptography data publishing data-based access control database security execution monitoring inference control integrity intrusion detecti

Editors and affiliations

  • Ehud Gudes
    • 1
  • Jaideep Vaidya
    • 2
  1. 1.Department of Computer Science, Beer-ShevaBen-Gurion University of the NegevIsrael
  2. 2.MSIS DepartmentRutgers UniversityNewarkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-03007-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-03006-2
  • Online ISBN 978-3-642-03007-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book