当前位置:首页 > 计算机网络 > 信息安全 > 数据与应用安全 XIX /Data and Applications Security XIX
出版社:北京燕山出版社
出版日期:2005-12
ISBN:9783540281382
作者:Jajodia, Sushil; Wijesekera, Duminda;
页数:352页
书籍目录
Streams, Security and ScalabilitTowards Privacy-Enhanced Authorization Policies and LanguagesRevocation of Obligation and Authorisation Policy ObjectsRole Slices: A Notation for RBAC Permission Assignment and EnforcementDesigning Secure Indexes for Encrypted DatabasesEfficiency and Security Trade-Off in Supporting Range Queries on Encrypted DatabasesVerified Query Results from Hybrid Authentication TreesMultilevel Secure Teleconferencing over Public Switched Telephone NetworkSecrecy of Two-Party Secure ComputationReliable Scheduling of Advanced TransactionsPrivacy-Preserving Decision Trees over Vertically Partitioned DataPrivacy-Preserving Collaborative Association Rule MiningPrivacy-Preserving Distributed k-AnonymityTowards Database FirewallsComplete Redundancy Detection in FirewallsA Comprehensive Approach to Anomaly Detection in Relational DatabasesAn Authorization Architecture for Web ServicesSecure Model Management Operations for the WebA Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic CoalitionsSecure Mediation with Mobile CodeSecurity Vulnerabilities in Software Systems: A Quantitative PerspectTrading Off Security in a Service Oriented ArchitectureTrusted Identity and Session Management Using Secure CookiesSecurity Issues in Querying Encrypted DataBlind Custodians: A Database Service Architecture That Supports Privacy Without EncryptionAuthor Index
作者简介
This book constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, CT, USA, in August 2005. The 24 revised full papers presented together with an invited lecture were thoroughly reviewed and selected from 54 submissions. The papers present theory, technique, applications, and practical experience of data and application security with topics like cryptography, privacy, security planning and administration, secure information integration, secure semantic Web technologies and applications, access control, integrity maintenance, knowledge discovery and privacy, concurrency control, fault-tolerance and recovery methods.
图书封面
数据与应用安全 XIX /Data and Applications Security XIX下载