top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor)
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XI, 352 p.)
Disciplina 004
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Database security
ISBN 3-540-70567-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Dynamic Meta-level Access Control in SQL -- On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model -- Audit and Logging -- A Unified Audit Expression Model for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale? -- Privacy I -- P4A: A New Privacy Model for XML -- Privacy-Aware Collaborative Access Control in Web-Based Social Networks -- A Privacy-Preserving Ticketing System -- The Analysis of Windows Vista Disk Encryption Algorithm -- Shared and Searchable Encrypted Data for Untrusted Servers -- Secure Construction of Contingency Tables from Distributed Data -- Web Services Security: Techniques and Challenges (Extended Abstract) -- Empirical Analysis of Certificate Revocation Lists -- Using New Tools for Certificate Repositories Generation in MANETs -- Privacy II -- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure -- Protecting the Publishing Identity in Multiple Tuples -- Panel Session: What Are the Key Challenges in Distributed Security? -- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services -- Sharing but Protecting Content Against Internal Leakage for Organisations -- Regulating Exceptions in Healthcare Using Policy Spaces -- Towards Automation of Testing High-Level Security Properties -- An Attack Graph-Based Probabilistic Security Metric -- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems -- DIWeDa - Detecting Intrusions in Web Databases -- Securing Workflows with XACML, RDF and BPEL.
Record Nr. UNINA-9910483892103321
Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor)
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / / Vijay Atluri (editor)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XI, 352 p.)
Disciplina 004
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Database security
ISBN 3-540-70567-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Dynamic Meta-level Access Control in SQL -- On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model -- Audit and Logging -- A Unified Audit Expression Model for Auditing SQL Queries -- A New Approach to Secure Logging -- Keynote -- Security, Functionality and Scale? -- Privacy I -- P4A: A New Privacy Model for XML -- Privacy-Aware Collaborative Access Control in Web-Based Social Networks -- A Privacy-Preserving Ticketing System -- The Analysis of Windows Vista Disk Encryption Algorithm -- Shared and Searchable Encrypted Data for Untrusted Servers -- Secure Construction of Contingency Tables from Distributed Data -- Web Services Security: Techniques and Challenges (Extended Abstract) -- Empirical Analysis of Certificate Revocation Lists -- Using New Tools for Certificate Repositories Generation in MANETs -- Privacy II -- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure -- Protecting the Publishing Identity in Multiple Tuples -- Panel Session: What Are the Key Challenges in Distributed Security? -- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services -- Sharing but Protecting Content Against Internal Leakage for Organisations -- Regulating Exceptions in Healthcare Using Policy Spaces -- Towards Automation of Testing High-Level Security Properties -- An Attack Graph-Based Probabilistic Security Metric -- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems -- DIWeDa - Detecting Intrusions in Web Databases -- Securing Workflows with XACML, RDF and BPEL.
Record Nr. UNISA-996465809503316
Berlin, Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui