Research Directions in Data and Applications Security Ifip Tc11
نام عام مواد
[Book]
نام نخستين پديدآور
Wg11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, Uk.
وضعیت نشر و پخش و غیره
نام ناشر، پخش کننده و غيره
Springer-Verlag New York Inc
تاریخ نشرو بخش و غیره
2013
یادداشتهای مربوط به مندرجات
متن يادداشت
Contributing Authors. Preface. I: Role-Based Access Control. 1. Shielding RBAC Infrastructures from Cyberterrorism; A. Belokosztolszki, D. Eyers. 2. Privelege Administration for the Role Graph Model; C. Ionita, S. Osborn. 3. Implementing RBAC Policies; S. Barker, et al. 4. Role Delegation for a Resource-Based Security Model; M. Liebrand, et al. 5. Using X.509 Attribute Certificates for Role-Based EAM; Dongwan Shin, et al. 6. Implementing Workflow Systems; L. Dreyer, M. Olivier. II: Database Security. 7. Multiphase Damage Confinement System for Databases; Peng Liu, Ying Wang. 8. Analyzing Transaction Logs for Effective Damage Assessment; P. Ragothaman, B. Panda. 9. Deductive Database Security; S. Baker. III: XML Security. 10. Towards Secure XML Federations; Lingyu Wang, et al. 11. Secure XML Views; A. Stoica, C. Farkas. 12. Distributed Cooperative Updates of XML Documents; E. Bertino, et al. IV: Data Mining and Inference. 13. On Security and Privacy Risks in Association Mining Algorithms; T. Johnsten, et al. 14. Mining Malicious Corruption of Data with Hidden Markov Models; D. Barbara, et al. 15. A Study of Inference Problems in Distributed Databases; LiWu Chang, I. Moskowitz. V: Multimedia System Security. 16. Uniform Indexing for Geospatial Data and Authorizations; V. Atluri, P. Mazzoleni. 17. Access Control of SVG Documents; E. Damiani, et al. VI: Network Security. 18. On Modeling Computer Networks for VulnerabilityAnalysis; C. Campbell, et al. 19. On-Line Intrusion Protection by Detecting Attacks with Diversity; J. Reynolds, et al. VII: Public Key Infrastructure. 20. Recertification: A Technique to Improve Services in PKI; R. Mukkamala, et al. 21. A Hybrid PKI Model: Application to Secure Mediation; J. Biskup, Y. Karabulut. VIII: Formal Methods and Protocols. 22. Implementation and Verification of Programmable Security; S. Magill, et al. 23. A Process Algebraic Approach to Security Policies; P. Ryan, R. Ryvold Arnesen. 24. Anonymous and Secure Multicast Subscription; Indrajit Ray, Indrakshi Ray. IX: Security and Privacy. 25.Privacy and Civil Liberties. D. Chadwick, et al.
رده بندی کنگره
شماره رده
QA76
.
9
.
D314
نشانه اثر
W475
2013
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )
مستند نام اشخاص تاييد نشده
Wg11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, Uk.