20. DBSec 2006:
Sophia Antipolis,
France
Ernesto Damiani, Peng Liu (Eds.):
Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings.
Lecture Notes in Computer Science 4127 Springer 2006, ISBN 3-540-36796-9 BibTeX
- Nicola Zannone, Sushil Jajodia, Duminda Wijesekera:
Creating Objects in the Flexible Authorization Framework.
1-14
Electronic Edition (link) BibTeX
- Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham:
Detection and Resolution of Anomalies in Firewall Policy Rules.
15-29
Electronic Edition (link) BibTeX
- Joachim Biskup, Lena Wiese:
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.
30-43
Electronic Edition (link) BibTeX
- Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz:
Consolidating the Access Control of Composite Applications and Workflows.
44-59
Electronic Edition (link) BibTeX
- Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan:
Authenticating Multi-dimensional Query Results in Data Publishing.
60-73
Electronic Edition (link) BibTeX
- Julien Lafaye, David Gross-Amblard:
XML Streams Watermarking.
74-88
Electronic Edition (link) BibTeX
- Einar Mykletun, Gene Tsudik:
Aggregation Queries in the Database-As-a-Service Model.
89-103
Electronic Edition (link) BibTeX
- Nataliya Rassadko:
Policy Classes and Query Rewriting Algorithm for XML Security Views.
104-118
Electronic Edition (link) BibTeX
- Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Interactive Analysis of Attack Graphs Using Relational Queries.
119-132
Electronic Edition (link) BibTeX
- Michael T. Goodrich, Roberto Tamassia, Danfeng Yao:
Notarized Federated Identity Management for Web Services.
133-147
Electronic Edition (link) BibTeX
- Noa Tuval, Ehud Gudes:
Resolving Information Flow Conflicts in RBAC Systems.
148-162
Electronic Edition (link) BibTeX
- Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann:
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
163-178
Electronic Edition (link) BibTeX
- Steve Barker, Maribel Fernández:
Term Rewriting for Access Control.
179-193
Electronic Edition (link) BibTeX
- Jason Crampton:
Discretionary and Mandatory Controls for Role-Based Administration.
194-208
Electronic Edition (link) BibTeX
- Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari:
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.
209-223
Electronic Edition (link) BibTeX
- Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Enhancing User Privacy Through Data Handling Policies.
224-236
Electronic Edition (link) BibTeX
- Vijayalakshmi Atluri, Heechang Shin:
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users.
237-251
Electronic Edition (link) BibTeX
- Indrajit Ray, Sudip Chakraborty:
A Framework for Flexible Access Control in Digital Library Systems.
252-266
Electronic Edition (link) BibTeX
- Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe:
Authrule: A Generic Rule-Based Authorization Module.
267-281
Electronic Edition (link) BibTeX
- Geri Georg, Siv Hilde Houmb, Indrakshi Ray:
Aspect-Oriented Risk Driven Development of Secure Applications.
282-296
Electronic Edition (link) BibTeX
- Philip Robinson, Florian Kerschbaum, Andreas Schaad:
From Business Process Choreography to Authorization Policies.
297-309
Electronic Edition (link) BibTeX
- Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu:
Information Theoretical Analysis of Two-Party Secret Computation.
310-317
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:06:07 2009
by Michael Ley (ley@uni-trier.de)