05043nam 22007935 450 99646591320331620200704075022.010.1007/11535706(CKB)1000000000213168(SSID)ssj0000317094(PQKBManifestationID)11222212(PQKBTitleCode)TC0000317094(PQKBWorkID)10287512(PQKB)10770739(DE-He213)978-3-540-31937-5(MiAaPQ)EBC3067553(PPN)123096561(EXLCZ)99100000000021316820100726d2005 u| 0engurnn|008mamaatxtccrData and Applications Security XIX[electronic resource] 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings /edited by Sushil Jajodia, Duminda Wijesekera1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (X, 353 p.) Information Systems and Applications, incl. Internet/Web, and HCI ;3654Bibliographic Level Mode of Issuance: MonographPrinted edition: 9783540281382 Includes bibliographic references and index.Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Results from Hybrid Authentication Trees -- Multilevel Secure Teleconferencing over Public Switched Telephone Network -- Secrecy of Two-Party Secure Computation -- Reliable Scheduling of Advanced Transactions -- Privacy-Preserving Decision Trees over Vertically Partitioned Data -- Privacy-Preserving Collaborative Association Rule Mining -- Privacy-Preserving Distributed k-Anonymity -- Towards Database Firewalls -- Complete Redundancy Detection in Firewalls -- A Comprehensive Approach to Anomaly Detection in Relational Databases -- An Authorization Architecture for Web Services -- Secure Model Management Operations for the Web -- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions -- Secure Mediation with Mobile Code -- Security Vulnerabilities in Software Systems: A Quantitative Perspective -- Trading Off Security in a Service Oriented Architecture -- Trusted Identity and Session Management Using Secure Cookies -- Security Issues in Querying Encrypted Data -- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.Information Systems and Applications, incl. Internet/Web, and HCI ;3654Data encryption (Computer science)Computer communication systemsSpecial purpose computersOperating systems (Computers)AlgorithmsManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Special Purpose and Application-Based Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I13030Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer communication systems.Special purpose computers.Operating systems (Computers).Algorithms.Management information systems.Computer science.Cryptology.Computer Communication Networks.Special Purpose and Application-Based Systems.Operating Systems.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.005.8Jajodia Sushiledthttp://id.loc.gov/vocabulary/relators/edtWijesekera Dumindaedthttp://id.loc.gov/vocabulary/relators/edtLINK (Online service)IFIP WG 11.3 Working Conference on Data and Applications SecurityBOOK996465913203316Data and Applications Security XIX772819UNISA