LEADER 06416nam 22008055 450 001 996465589403316 005 20200704142129.0 010 $a3-540-36799-3 024 7 $a10.1007/11805588 035 $a(CKB)1000000000233061 035 $a(SSID)ssj0000317095 035 $a(PQKBManifestationID)11251779 035 $a(PQKBTitleCode)TC0000317095 035 $a(PQKBWorkID)10286930 035 $a(PQKB)11450660 035 $a(DE-He213)978-3-540-36799-4 035 $a(MiAaPQ)EBC3068253 035 $a(PPN)123137004 035 $a(EXLCZ)991000000000233061 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aData and Applications Security XX$b[electronic resource] $e20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings /$fedited by Ernesto Damiani, Peng Liu 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (X, 319 p.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v4127 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-36796-9 320 $aIncludes bibliographic references and index. 327 $aCreating Objects in the Flexible Authorization Framework -- Detection and Resolution of Anomalies in Firewall Policy Rules -- On Finding an Inference-Proof Complete Database for Controlled Query Evaluation -- Consolidating the Access Control of Composite Applications and Workflows -- Authenticating Multi-dimensional Query Results in Data Publishing -- Xml Streams Watermarking -- Aggregation Queries in the Database-As-a-Service Model -- Policy Classes and Query Rewriting Algorithm for XML Security Views -- Interactive Analysis of Attack Graphs Using Relational Queries -- Notarized Federated Identity Management for Web Services -- Resolving Information Flow Conflicts in RBAC Systems -- Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems -- Term Rewriting for Access Control -- Discretionary and Mandatory Controls for Role-Based Administration -- A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach -- Enhancing User Privacy Through Data Handling Policies -- Efficient Enforcement of Security Policies Based on Tracking of Mobile Users -- A Framework for Flexible Access Control in Digital Library Systems -- Authrule: A Generic Rule-Based Authorization Module -- Aspect-Oriented Risk Driven Development of Secure Applications -- From Business Process Choreography to Authorization Policies -- Information Theoretical Analysis of Two-Party Secret Computation. 330 $aFor 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of the change that has occurred in our ?eld. Once considered afterthoughts in systems and application design, data protection, privacy and trust have become the key problems of our day. This central role of security in the information society has however brought increased responsibilities to the research community. - day practitioners and researchers alike need to ?nd new ways to cope with the increasing scale and complexity of the security problems that must be solved on the global information infrastructure. Like the previous conference, the 20th DBSEC has proved to be up to this challenge. DBSEC 2006 received 56 submissions, out of which the program committee selected22 high-qualitypaperscoveringanumber of diverseresearchtopicssuch as access control, privacy, and identity management. We are glad to see that the ?nal program contains a well-balanced mix of theoretical results and practical prototype systems, many of them converging and building o? each other. Also, the DBSEC program includes a number of papers on new, emerging aspects of security research. Putting together a top-level conference like DBSEC is always a team e?ort. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v4127 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aSpecial purpose computers 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aSpecial purpose computers. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a005.8 702 $aDamiani$b Ernesto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLiu$b Peng$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aIFIP WG 11.3 Working Conference on Data and Applications Security 906 $aBOOK 912 $a996465589403316 996 $aData and Applications Security XX$9772742 997 $aUNISA