Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephones (English)
Free access
- New search for: Youn, Inja
- New search for: Wijesekera, Duminda
- New search for: Youn, Inja
- New search for: Wijesekera, Duminda
In:
Research Directions in Data and Applications Security XVIII
6
;
205-218
;
2004
-
ISSN:
- Article/Chapter (Book) / Electronic Resource
-
Title:Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephones
-
Contributors:Youn, Inja ( author ) / Wijesekera, Duminda ( author )
-
Published in:IFIP International Federation for Information Processing ; 144, 6 ; 205-218
-
Publisher:
- New search for: Springer US
-
Place of publication:Boston, MA
-
Publication date:2004-01-01
-
Size:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Invited Talk - Inference Control Problems in Statistical Database Query SystemsCox, Lawrence H. et al. | 2004
- 15
-
Attribute Mutability in Usage ControlPark, Jaehong / Zhang, Xinwen / Sandhu, Ravi et al. | 2004
- 31
-
Star-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal AuthorizationsAtluri, Vijayalakshmi / Guo, Qi et al. | 2004
- 49
-
An Extended Analysis of Delegating ObligationsSchaad, Andreas et al. | 2004
- 65
-
Implementing Real-Time Update of Access Control PoliciesRay, Indrakshi / Xin, Tai et al. | 2004
- 81
-
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational DatabasesLi, Yingjiu / Swarup, Vipin / Jajodia, Sushil et al. | 2004
- 95
-
Performance-Conscious Key Management in Encrypted DatabasesHacigümüs, Hakan / Mehrotra, Sharad et al. | 2004
- 111
-
Damage Discovery in Distributed Database SystemsZuo, Yanjun / Panda, Brajendra et al. | 2004
- 125
-
Information Flow Analysis for File Systems and Databases Using LabelsGudes, Ehud / Mancini, Luigi V. / Parisi-Presicce, Francesco et al. | 2004
- 143
-
Refusal in Incomplete DatabasesBiskup, Joachim / Weibert, Torben et al. | 2004
- 159
-
Why is This User Asking So Many Questions? Explaining Sequences of QueriesAcar, Aybar C. / Motro, Amihai et al. | 2004
- 177
-
Invited Talk - Towards Semantics-Aware Access ControlDamiani, Ernesto / Capitani di Vimercati, Sabrina et al. | 2004
- 189
-
RBAC/MAC Security for UMLDoan, T. / Demurjian, S. / Ting, T.C. / Phillips, C. et al. | 2004
- 205
-
Secure Bridges: A Means to Conduct Secure Teleconferences Over Public TelephonesYoun, Inja / Wijesekera, Duminda et al. | 2004
- 219
-
Policy-Based Security Management for Enterprise SystemsMukkamala, R. / Chekuri, L. / Moharrum, M. / Palley, S. et al. | 2004
- 235
-
A Pattern System for Access ControlPriebe, Torsten / Fernandez, Eduardo B. / Mehlau, Jens I. / Pernul, Günther et al. | 2004
- 251
-
A Design for Parameterized RolesGe, Mei / Osborn, Sylvia L. et al. | 2004
- 265
-
Efficient Verification of Delegation in Distributed Group Membership ManagementHuraj, Ladislav / Reiser, Helmut et al. | 2004
- 281
-
Web Resource Usage Control in RSCLPBarker, Steve et al. | 2004
- 295
-
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer CooperationRay, Indrajit / Hajek, Tomas et al. | 2004
- 311
-
On the Damage and Compensation of Privacy LeakageWang, Da-Wei / Liau, Churn-Jung / Hsu, Tsan-sheng / Chen, Jeremy K.-P. et al. | 2004
- 325
-
An Experimental Study of Distortion-Based Techniques for Association Rule HidingPontikakis, Emmanuel D. / Tsitsonis, Achilleas A. / Verykios, Vassilios S. et al. | 2004
- 341
-
Privacy-Preserving Multi-Party Decision Tree InductionZhan, Justin Z. / Chang, LiWu / Matwin, Stan et al. | 2004
- 357
-
Configuring Storage-Area Networks for Mandatory SecurityAziz, Benjamin / Foley, Simon N. / Herbert, John / Swart, Garret et al. | 2004
- 371
-
A Framework for Trusted Wireless Sensor NetworksPark, Joon S. / Jain, Abhishek et al. | 2004