rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540705666

Data and Applications Security XXII: 22nd Annual Ifip Wg 11.3 Working Conference on Data and Applications Security London, Uk, July 13-16, 2008, Proceedings

by
  • ISBN13:

    9783540705666

  • ISBN10:

    354070566X

  • Format: Paperback
  • Copyright: 2008-08-03
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $109.00

Summary

This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008.The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems.

Table of Contents

Dynamic Meta-level Access Control in SQLp. 1
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Modelp. 17
A Unified Audit Expression Model for Auditing SQL Queriesp. 33
A New Approach to Secure Loggingp. 48
Security, Functionality and Scale?p. 64
P4A: A New Privacy Model for XMLp. 65
Privacy-Aware Collaborative Access Control in Web-Based Social Networksp. 81
A Privacy-Preserving Ticketing Systemp. 97
The Analysis of Windows Vista Disk Encryption Algorithmp. 113
Shared and Searchable Encrypted Data for Untrusted Serversp. 127
Secure Construction of Contingency Tables from Distributed Datap. 144
Web Services Security: Techniques and Challengesp. 158
Empirical Analysis of Certificate Revocation Listsp. 159
Using New Tools for Certificate Repositories Generation in MANETsp. 175
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosurep. 190
Protecting the Publishing Identity in Multiple Tuplesp. 205
Panel Session: What Are the Key Challenges in Distributed Security?p. 219
On the Applicability of Trusted Computing in Distributed Authorization Using Web Servicesp. 222
Sharing but Protecting Content Against Internal Leakage for Organisationsp. 238
Regulating Exceptions in Healthcare Using Policy Spacesp. 254
Towards Automation of Testing High-Level Security Propertiesp. 268
An Attack Graph-Based Probabilistic Security Metricp. 283
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systemsp. 297
DIWeDa - Detecting Intrusions in Web Databasesp. 313
Securing Workflows with XACML, RDF and BPELp. 330
Author Indexp. 347
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program