LEADER 04410nam 2200697 450 001 996465625403316 005 20220506195354.0 010 $a1-282-29798-8 010 $a9786612297984 010 $a3-642-03007-6 024 7 $a10.1007/978-3-642-03007-9 035 $a(CKB)1000000000761231 035 $a(EBL)450647 035 $a(OCoLC)437345745 035 $a(SSID)ssj0000293424 035 $a(PQKBManifestationID)11234342 035 $a(PQKBTitleCode)TC0000293424 035 $a(PQKBWorkID)10273683 035 $a(PQKB)11621693 035 $a(DE-He213)978-3-642-03007-9 035 $a(MiAaPQ)EBC450647 035 $a(MiAaPQ)EBC6707312 035 $a(Au-PeEL)EBL6707312 035 $a(PPN)136310710 035 $a(EXLCZ)991000000000761231 100 $a20220506d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aData and applications security XXIII $e23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings /$fEhud Gudes, Jaideep Vaidya (editors) 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer-Verlag,$d[2009] 210 4$dİ2009 215 $a1 online resource (324 p.) 225 1 $aLecture Notes in Computer Science ;$v5645 300 $aDescription based upon print version of record. 311 $a3-642-03006-8 320 $aIncludes bibliographical references and index. 327 $aDatabase Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications. 330 $aThis book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009. The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing. 410 0$aLecture notes in computer science ;$v5645. 606 $aDatabase security$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 606 $aComputers$xAccess control$vCongresses 615 0$aDatabase security 615 0$aComputer networks$xSecurity measures 615 0$aComputers$xAccess control 676 $a005.8 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aGudes$b Ehud 702 $aVaidya$b Jaideep 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465625403316 996 $aData and Applications Security XXIII$92239807 997 $aUNISA