Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 21st Annual Working Conference on Data and Applications Security held in Redondo Beach, CA, USA in July 2007.

The 18 revised full papers and 2 revised short papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based security, temporal access control and usage control, as well as system security issues.

Author(s): Joachim Biskup, Torben Weibert (auth.), Steve Barker, Gail-Joon Ahn (eds.)
Series: Lecture Notes in Computer Science 4602
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 293
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Special Purpose and Application-Based Systems

Front Matter....Pages -
Confidentiality Policies for Controlled Query Evaluation....Pages 1-13
Provably-Secure Schemes for Basic Query Support in Outsourced Databases....Pages 14-30
Authenticated Relational Tables and Authenticated Skip Lists....Pages 31-46
Location Privacy Protection Through Obfuscation-Based Techniques....Pages 47-60
Efficient Security Policy Enforcement in a Location Based Service Environment....Pages 61-76
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments....Pages 77-92
Privacy-Preserving Schema Matching Using Mutual Information....Pages 93-94
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers....Pages 95-97
Measuring the Overall Security of Network Configurations Using Attack Graphs....Pages 98-112
Enforcing Honesty in Assured Information Sharing Within a Distributed System....Pages 113-128
A Privacy-Enhanced Attribute-Based Access Control System....Pages 129-143
A Scalable and Secure Cryptographic Service....Pages 144-160
gVault: A Gmail Based Cryptographic Network File System....Pages 161-176
Design and Analysis of Querying Encrypted Data in Relational Databases....Pages 177-194
Dynamic Event-Based Access Control as Term Rewriting....Pages 195-210
A Spatio-temporal Role-Based Access Control Model....Pages 211-226
Towards a Times-Based Usage Control Model....Pages 227-242
New Paradigm of Inference Control with Trusted Computing....Pages 243-258
Security Patterns for Physical Access Control Systems....Pages 259-274
XACML Policies for Exclusive Resource Usage....Pages 275-290
Back Matter....Pages -