Data and Applications Security XXII

22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

  • Editors
  • Vijay Atluri
Conference proceedings DBSec 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5094)

Table of contents

  1. Front Matter
  2. Access Control

  3. Audit and Logging

    1. Vikram Goyal, S. K. Gupta, Anand Gupta
      Pages 33-47
    2. Di Ma, Gene Tsudik
      Pages 48-63
  4. Keynote

    1. Ross Anderson
      Pages 64-64
  5. Privacy I

    1. Angela C. Duta, Ken Barker
      Pages 65-80
    2. Kristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe
      Pages 97-112
    3. Systems Security

      1. Mohamed Abo El-Fotouh, Klaus Diepold
        Pages 113-126
      2. Changyu Dong, Giovanni Russello, Naranker Dulay
        Pages 127-143
      3. Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil Adam
        Pages 144-157
    4. Invited Talk

    5. Certificate Management

      1. Daryl Walleck, Yingjiu Li, Shouhuai Xu
        Pages 159-174
      2. Candelaria Hernández-Goya, Pino Caballero-Gil, Oscar Delgado-Mohatar, Jezabel Molina-Gil, Cándido Caballero-Gil
        Pages 175-189
  6. Privacy II

    1. Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky
      Pages 190-204
    2. Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang
      Pages 205-218
    3. Panel

      1. Steve Barker, David Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham
        Pages 219-221
    4. Trusted Computing Platforms

      1. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora
        Pages 222-237

About these proceedings

Introduction

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 high-quality research papers, which were selected from a total of 56 submissions after a rigorous reviewing process by the Program Committee members and external reviewers. These sessions included such topics as access control, privacy, auditing, systems security and data security in advanced app- cation domains. In addition, the programincluded a keynote address, an invited talk and a panel session. The success of this conference was a result of the e?orts of many people. I would like to extend my appreciation to the Program Committee members and external reviewers for their hard work. I would like to thank the General Chair, SteveBarker,fortakingcareoftheorganizationaspectsoftheconferenceandfor arranging the keynote address and the panel session. I would also like to thank Claudio Ardagna for serving as the Publicity Chair and for promptly updating the conference Web page, and Don Lokuadassuriyage for serving as the Local Arrangements Chair. Special thanks go to Alfred Hofmann, Editorial Director at Springer, for agreeing to include these conference proceedings in the Lecture Notes in Computer Science series.

Keywords

Access access control anonymity auditing authentication authorization concurrency control cryptography data publishing database security disk encryption dynamic analysis integrity maintenance pervasive computin security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-70567-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-70566-6
  • Online ISBN 978-3-540-70567-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book