E-Books durchsuchen

Data and Applications Security XX [2006]

1
Creating Objects in the Flexible Authorization Framework
15
Detection and Resolution of Anomalies in Firewall Policy Rules
30
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
44
Consolidating the Access Control of Composite Applications and Workflows
60
Authenticating Multi-dimensional Query Results in Data Publishing
74
<Emphasis Type="SmallCaps">Xml</Emphasis> Streams Watermarking
89
Aggregation Queries in the Database-As-a-Service Model
104
Policy Classes and Query Rewriting Algorithm for XML Security Views
119
Interactive Analysis of Attack Graphs Using Relational Queries
133
Notarized Federated Identity Management for Web Services
148
Resolving Information Flow Conflicts in RBAC Systems
163
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
179
Term Rewriting for Access Control
194
Discretionary and Mandatory Controls for Role-Based Administration
209
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach
224
Enhancing User Privacy Through Data Handling Policies
237
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users
252
A Framework for Flexible Access Control in Digital Library Systems
267
Authrule: A Generic Rule-Based Authorization Module
282
Aspect-Oriented Risk Driven Development of Secure Applications
297
From Business Process Choreography to Authorization Policies
310
Information Theoretical Analysis of Two-Party Secret Computation
Feedback