Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

Portada
Ehud Gudes, Sujeet Shenoi
Springer Science & Business Media, 2003 M07 31 - 346 páginas
Security and privacy are paramount concerns in database systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunications networks are providing incredible connectivity, myriad applications and, of course, new threats.
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include:

-Role-Based Access Control;
-Database Security;
-XML Security;
-Data Mining and Inference;
-Multimedia System Security;
-Network Security;
-Public Key Infrastructure;
-Formal Methods and Protocols;
-Security and Privacy.

This book is the sixteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Application Security. It presents a selection of twenty-five updated and edited papers from the Sixteenth Annual IFIP WG 11.3 Conference on Data and Application Security, held at King's College, Cambridge, U.K. in July 2002. The papers demonstrate the richness and vitality of the discipline, and offer directions for future research efforts in data and applications security.
Research Directions in Data and Applications Security is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.
 

Contenido

SHIELDING RBAC INFRASTRUCTURES FROM CYBERTERRORISM
3
PRIVILEGE ADMINISTRATION FOR THE ROLE GRAPH MODEL
15
IMPLEMENTING RBAC POLICIES
27
ROLE DELEGATION FOR A RESOURCEBASED SECURITY MODEL
37
USING X509 ATTRIBUTE CERTIFICATES FOR ROLEBASED EAM
49
IMPLEMENTING WORKFLOW SYSTEMS
61
DATABASE SECURITY
73
MULTIPHASE DAMAGE CONFINEMENT SYSTEM FOR DATABASES
75
A STUDY OF INFERENCE PROBLEMS IN DISTRIBUTED DATABASES
191
MULTIMEDIA SYSTEM SECURITY
205
UNIFORM INDEXING FOR GEOSPATIAL DATA AND AUTHORIZATIONS
207
ACCESS CONTROL OF SVG DOCUMENTS
219
NETWORK SECURITY
231
ON MODELING COMPUTER NETWORKS FOR VULNERABILITY ANALYSIS
233
ONLINE INTRUSION PROTECTION BY DETECTING ATTACKS WITH DIVERSITY
245
PUBLIC KEY INFRASTRUCTURE
257

ANALYZING TRANSACTION LOGS FOR EFFECTIVE DAMAGE ASSESSMENT
89
DEDUCTIVE DATABASE SECURITY
103
XML SECURITY
115
TOWARDS SECURE XML FEDERATIONS
117
SECURE XML VIEWS
133
DISTRIBUTED COOPERATIVE UPDATES OF XML DOCUMENTS
147
MINING AND INFERENCE
161
ON SECURITY AND PRIVACY RISKS IN ASSOCIATION MINING ALGORITHMS
163
MINING MALICIOUS CORRUPTION OF DATA WITH HIDDEN MARKOV MODELS
175
RECERTIFICATION A TECHNIQUE TO IMPROVE SERVICES IN PKI
259
A HYBRID PKI MODEL APPLICATION TO SECURE MEDIATION
271
FORMAL METHODS AND PROTOCOLS
283
IMPLEMENTATION AND VERIFICATION OF PROGRAMMABLE SECURITY
285
ANONYMOUS AND SECURE MULTICAST SUBSCRIPTION
311
SECURITY AND PRIVACY
327
PRIVACY AND CIVIL LIBERTIES
329
Derechos de autor

Otras ediciones - Ver todas

Términos y frases comunes

Información bibliográfica