E-Books durchsuchen
Data and Applications Security XX [2006]
- 1
-
Creating Objects in the Flexible Authorization Framework
- 15
-
Detection and Resolution of Anomalies in Firewall Policy Rules
- 30
-
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
- 44
-
Consolidating the Access Control of Composite Applications and Workflows
- 60
-
Authenticating Multi-dimensional Query Results in Data Publishing
- 74
-
<Emphasis Type="SmallCaps">Xml</Emphasis> Streams Watermarking
- 89
-
Aggregation Queries in the Database-As-a-Service Model
- 104
-
Policy Classes and Query Rewriting Algorithm for XML Security Views
- 119
-
Interactive Analysis of Attack Graphs Using Relational Queries
- 133
-
Notarized Federated Identity Management for Web Services
- 148
-
Resolving Information Flow Conflicts in RBAC Systems
- 163
-
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
- 179
-
Term Rewriting for Access Control
- 194
-
Discretionary and Mandatory Controls for Role-Based Administration
- 209
-
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach
- 224
-
Enhancing User Privacy Through Data Handling Policies
- 237
-
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users
- 252
-
A Framework for Flexible Access Control in Digital Library Systems
- 267
-
Authrule: A Generic Rule-Based Authorization Module
- 282
-
Aspect-Oriented Risk Driven Development of Secure Applications
- 297
-
From Business Process Choreography to Authorization Policies
- 310
-
Information Theoretical Analysis of Two-Party Secret Computation