This book constitutes the refereed proceedings of the 21st Annual Working Conference on Data and Applications Security held in Redondo Beach, CA, USA in July 2007.
The 18 revised full papers and 2 revised short papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based security, temporal access control and usage control, as well as system security issues.
Author(s): Joachim Biskup, Torben Weibert (auth.), Steve Barker, Gail-Joon Ahn (eds.)
Series: Lecture Notes in Computer Science 4602
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 293
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Special Purpose and Application-Based Systems
Front Matter....Pages -
Confidentiality Policies for Controlled Query Evaluation....Pages 1-13
Provably-Secure Schemes for Basic Query Support in Outsourced Databases....Pages 14-30
Authenticated Relational Tables and Authenticated Skip Lists....Pages 31-46
Location Privacy Protection Through Obfuscation-Based Techniques....Pages 47-60
Efficient Security Policy Enforcement in a Location Based Service Environment....Pages 61-76
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments....Pages 77-92
Privacy-Preserving Schema Matching Using Mutual Information....Pages 93-94
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers....Pages 95-97
Measuring the Overall Security of Network Configurations Using Attack Graphs....Pages 98-112
Enforcing Honesty in Assured Information Sharing Within a Distributed System....Pages 113-128
A Privacy-Enhanced Attribute-Based Access Control System....Pages 129-143
A Scalable and Secure Cryptographic Service....Pages 144-160
gVault: A Gmail Based Cryptographic Network File System....Pages 161-176
Design and Analysis of Querying Encrypted Data in Relational Databases....Pages 177-194
Dynamic Event-Based Access Control as Term Rewriting....Pages 195-210
A Spatio-temporal Role-Based Access Control Model....Pages 211-226
Towards a Times-Based Usage Control Model....Pages 227-242
New Paradigm of Inference Control with Trusted Computing....Pages 243-258
Security Patterns for Physical Access Control Systems....Pages 259-274
XACML Policies for Exclusive Resource Usage....Pages 275-290
Back Matter....Pages -