Document - eBookmela
Loading...

Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Confe | IFIP TC11/WG11.3 Annual Working Conference on Data and Applications Security (17th : 2003 : Estes Park, Col.), De Capitani di Vimercati, Sabrina, Ray, Indrakshi, Ray, Indrajit

Likes0
Telegram icon Share on Telegram

Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Confe

User Rating: Be the first one!

Author: IFIP TC11/WG11.3 Annual Working Conference on Data and Applications Security (17th : 2003 : Estes Park, Col.), De Capitani di Vimercati, Sabrina, Ray, Indrakshi, Ray, Indrajit

Added by: sketch

Added Date: 2015-12-30

Publication Date: 2004

Language: eng

Subjects: Database security

Publishers: Boston : Kluwer Academic Publishers

Collections: folkscanomy miscellaneous, folkscanomy, additional collections

ISBN Number: 1402080697, 1402080700

Pages Count: 112

PPI Count: 112

PDF Count: 1

Total Size: 91.54 MB

PDF Size: 18.37 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Archive Url

Downloads: 1.19K

Views: 51.19

Total Files: 18

Media Type: texts

Description

Data and Applications Security XVII: Status and Prospects
Author: Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray
Published by Springer US
ISBN: 978-1-4020-8069-2
DOI: 10.1007/b116220

Table of Contents:

  • Remote Computer Fingerprinting for Cyber Crime Investigations
  • Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases
  • Delivering Services with Integrity Guarantees in Survivable Database Systems
  • Certifying Data from Multiple Sources
  • Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model
  • Adapting Query Optimization Techniques for Efficient Alert Correlation
  • Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases
  • Privacy Under Conditions of Concurrent Interaction with Multiple Parties
  • Correlated Data Inference
  • Anti-Tamper Databases
  • Administration Rights in the SDSD-System
  • Secure Authorisation for Web Services
  • A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities
  • Supporting Delegation in Secure Workflow Management Systems
  • Modifying LDAP to Support PKI
  • ECPV: EFficient Certificate Path Validation in Public-Key Infrastructure
  • Semantics-Aware Perimeter Protection
  • Systematic Development of a Family of Fair Exchange Protocols
  • High-Speed Access Control for XML Documents
  • Chinese Wall Security Policy Models

Includes bibliographical references and index
eBookmela
Logo
Register New Account