LEADER 05610nam 22008775 450 001 9910483603803321 005 20251107173142.0 010 $a1-280-38729-7 010 $a9786613565211 010 $a3-642-13739-3 024 7 $a10.1007/978-3-642-13739-6 035 $a(CKB)2670000000036327 035 $a(SSID)ssj0000446403 035 $a(PQKBManifestationID)11249874 035 $a(PQKBTitleCode)TC0000446403 035 $a(PQKBWorkID)10496068 035 $a(PQKB)11617801 035 $a(DE-He213)978-3-642-13739-6 035 $a(MiAaPQ)EBC3065701 035 $a(PPN)149018215 035 $a(EXLCZ)992670000000036327 100 $a20100824d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aData and Applications Security and Privacy XXIV $e24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings /$fedited by Sara Foresti, Sushil Jajodia 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIII, 376 p. 80 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v6166 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-13738-5 320 $aIncludes bibliographical references and index. 327 $aQuery and Data Privacy -- Generalizing PIR for Practical Private Retrieval of Public Data -- A Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure Outsourcing of DNA Searching via Finite Automata -- A Labelling System for Derived Data Control -- On the Identification of Property Based Generalizations in Microdata Anonymization -- Access Control -- Role Mining in the Presence of Noise -- Distributed and Secure Access Control in P2P Databases -- Constructing Key Assignment Schemes from Chain Partitions -- Data Confidentiality and Query Verification -- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality -- Efficient Inference Control for Open Relational Queries -- Query Racing: Fast Completeness Certification of Query Results -- Policy Definition and Enforcement -- Mining Likely Properties of Access Control Policies via Association Rule Mining -- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control -- Enforcing Request Integrity in Web Applications -- Trust and Identity Management -- Using Trust-Based Information Aggregation for Predicting Security Level of Systems -- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms -- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms -- Short Papers -- An Access Control Model for Web Databases -- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems -- Evaluating the Risk of Adopting RBAC Roles -- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance -- When ABE Meets RSS -- PriMan : A Privacy-Preserving Identity Framework -- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach -- Authentication Assurance Level Taxonomies for Smart Identity TokenDeployments - A New Approach -- A Secure RFID Ticket System for Public Transport -- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols -- Secure Location Verification. 330 $aThis book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v6166 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aApplication software 606 $aAlgorithms 606 $aInformation storage and retrieval systems 606 $aComputer Communication Networks 606 $aCryptology 606 $aIT Operations 606 $aComputer and Information Systems Applications 606 $aAlgorithms 606 $aInformation Storage and Retrieval 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aElectronic data processing$xManagement. 615 0$aApplication software. 615 0$aAlgorithms. 615 0$aInformation storage and retrieval systems. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aComputer and Information Systems Applications. 615 24$aAlgorithms. 615 24$aInformation Storage and Retrieval. 676 $a005.8 701 $aForesti$b Sara$0724911 701 $aJajodia$b Sushil$028486 712 02$aInternational Federation for Information Processing. 712 12$aIFIP WG 11.3 Working Conference on Data and Applications Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483603803321 996 $aData and Applications Security and Privacy XXIV$94192782 997 $aUNINA