Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, CT, USA, in August 2005.

The 24 revised full papers presented together with an invited lecture were thoroughly reviewed and selected from 54 submissions. The papers present theory, technique, applications, and practical experience of data and application security with topics like cryptography, privacy, security planning and administration, secure information integration, secure semantic Web technologies and applications, access control, integrity maintenance, knowledge discovery and privacy, concurrency control, fault-tolerance and recovery methods.

Author(s): Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck (auth.), Sushil Jajodia, Duminda Wijesekera (eds.)
Series: Lecture Notes in Computer Science 3654 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 353
Tags: Data Encryption; Computer Communication Networks; Special Purpose and Application-Based Systems; Operating Systems; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems

Front Matter....Pages -
Streams, Security and Scalability....Pages 1-15
Towards Privacy-Enhanced Authorization Policies and Languages....Pages 16-27
Revocation of Obligation and Authorisation Policy Objects....Pages 28-39
Role Slices: A Notation for RBAC Permission Assignment and Enforcement....Pages 40-53
Designing Secure Indexes for Encrypted Databases....Pages 54-68
Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases....Pages 69-83
Verified Query Results from Hybrid Authentication Trees....Pages 84-98
Multilevel Secure Teleconferencing over Public Switched Telephone Network....Pages 99-113
Secrecy of Two-Party Secure Computation....Pages 114-123
Reliable Scheduling of Advanced Transactions....Pages 124-138
Privacy-Preserving Decision Trees over Vertically Partitioned Data....Pages 139-152
Privacy-Preserving Collaborative Association Rule Mining....Pages 153-165
Privacy-Preserving Distributed k -Anonymity....Pages 166-177
Towards Database Firewalls....Pages 178-192
Complete Redundancy Detection in Firewalls....Pages 193-206
A Comprehensive Approach to Anomaly Detection in Relational Databases....Pages 207-221
An Authorization Architecture for Web Services....Pages 222-236
Secure Model Management Operations for the Web....Pages 237-251
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions....Pages 252-266
Secure Mediation with Mobile Code....Pages 267-280
Security Vulnerabilities in Software Systems: A Quantitative Perspective....Pages 281-294
Trading Off Security in a Service Oriented Architecture....Pages 295-309
Trusted Identity and Session Management Using Secure Cookies....Pages 310-324
Security Issues in Querying Encrypted Data....Pages 325-337
Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption....Pages 338-352
Back Matter....Pages -