Description |
1 online resource (xi, 345 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 5094 |
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI |
|
Lecture notes in computer science ; 5094
|
|
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI
|
Contents |
Dynamic meta-level access control in SQL -- On the formal analysis of a spatio-temporal role-based access control model -- A unified audit expression model for auditing SQL queries -- A new approach to secure logging -- Security, functionality and scale? -- P4A: A new privacy model for XML -- Privacy-aware collaborative access control in web-based social networks -- A privacy-preserving ticketing system -- The analysis of windows vista disk encryption algorithm -- Shared and searchable encrypted data for untrusted servers -- Secure construction of contingency tables from distributed data -- Web services security: Techniques and challenges (extended abstract) -- Empirical analysis of certificate revocation lists -- Using new tools for certificate repositories generation in MANETs -- Exclusive strategy for generalization algorithms in micro-data disclosure -- Protecting the publishing identity in multiple tuples -- Panel session: What are the key challenges in distributed security? -- On the applicability of trusted computing in distributed authorization using web services -- Sharing but protecting content against internal leakage for organisations -- Regulating exceptions in healthcare using policy spaces -- Towards automation of testing high-level security properties -- An attack graph-based probabilistic security metric -- An opinion model for evaluating malicious activities in pervasive computing systems -- DIWeDa -- detecting intrusions in web databases -- Securing workflows with XACML, RDF and BPEL |
Summary |
Annotation This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008. The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems |
Bibliography |
Includes bibliographical references and index |
Notes |
English |
|
Print version record |
Subject |
Electronic data processing -- Distributed processing -- Security measures -- Congresses
|
|
Internet -- Security measures -- Congresses
|
|
Electronic commerce -- Congresses
|
|
Database security -- Congresses
|
|
Computer security.
|
|
Electronic Data Processing
|
|
Computer Security
|
|
Informatique.
|
|
Computer security
|
|
Database security
|
|
Electronic commerce
|
|
Electronic data processing -- Distributed processing -- Security measures
|
|
Internet -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Atluri, Vijay, 1956-
|
ISBN |
9783540705673 |
|
3540705678 |
|