Systematic Development of a Family of Fair Exchange Protocols (English)
- New search for: Ezhilchelvan, P. D.
- New search for: Shrivastava, S. K.
- New search for: Ezhilchelvan, P. D.
- New search for: Shrivastava, S. K.
- New search for: De Capitani di Vimercati, S.
- New search for: Ray, I.
In:
Annual working conference on data and applications security; IFIP TC11/WG11.3
142
;
243-260
;
2004
-
ISBN:
- Conference paper / Print
-
Title:Systematic Development of a Family of Fair Exchange Protocols
-
Contributors:Ezhilchelvan, P. D. ( author ) / Shrivastava, S. K. ( author ) / De Capitani di Vimercati, S. / Ray, I.
-
Conference:17th, Annual working conference on data and applications security; IFIP TC11/WG11.3 ; 2003 ; Estes Park, CO
-
Published in:
-
Publisher:
- New search for: London
-
Place of publication:Boston , Kluwer Academic, , c2004.
-
Publication date:2004-01-01
-
Size:18 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Remote Computer Fingerprinting for Cyber Crime InvestigationsNovotny, J. / Schulte, D. / Manes, G. / Shenoi, S. et al. | 2004
- 16
-
Improving Damage Assessment Efficacy in case of Frequent Attacks on DatabasesRagothaman, P. / Panda, B. et al. | 2004
- 33
-
Delivering Services with Integrity Guarantees in Survivable Database SystemsZhang, J. / Liu, P. et al. | 2004
- 47
-
Certifying Data from Multiple SourcesNuckolls, G. / Martel, C. / Stubblebine, S. G. et al. | 2004
- 61
-
Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service ModelHacigumus, H. / Iyer, B. / Mehrotra, S. et al. | 2004
- 75
-
Adapting Query Optimization Techniques for Efficient Alert CorrelationNing, P. / Xu, D. et al. | 2004
- 91
-
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned DatabasesGudes, E. / Rozenberg, B. et al. | 2004
- 105
-
Privacy under Conditions of Concurrent Interaction with Multiple PartiesOlivier, M. S. et al. | 2004
- 119
-
Correlated Data InferenceFarkas, C. / Stoica, A. G. et al. | 2004
- 133
-
Anti-Tamper Databases: Querying Encrypted DatabasesOzsoyoglu, G. / Singer, D. A. / Chung, S. S. et al. | 2004
- 149
-
Administration Rights in the SDSD-SystemBiskup, J. / Leineweber, T. / Parthe, J. et al. | 2004
- 163
-
Secure Authorisation for Web ServicesIndrakanti, S. / Varadharajan, V. / Hitchens, M. / Kumar, R. et al. | 2004
- 176
-
A Decentralized Approach for Controlled Sharing of Resources in Virtual CommunitiesBertino, E. / Ferrari, E. / Squicciarini, A. C. et al. | 2004
- 190
-
Supporting Delegation in Secure Workflow Management SystemsAtluri, V. / Bertino, E. / Ferrari, E. / Mazzoleni, P. et al. | 2004
- 205
-
Modifying LDAP to Support PKIChadwick, D. W. / Ball, E. / Sahalayev, M. V. et al. | 2004
- 215
-
ECPV: Efficient Certificate Path Validation in Public-key InfrastructureHalappanavar, M. / Mukkamala, R. et al. | 2004
- 229
-
Semantics-Aware Perimeter ProtectionCremonini, M. / Damiani, E. / Samarati, P. et al. | 2004
- 243
-
Systematic Development of a Family of Fair Exchange ProtocolsEzhilchelvan, P. D. / Shrivastava, S. K. et al. | 2004
- 261
-
High-speed Access Control for XML DocumentsYoon, J. P. et al. | 2004
- 275
-
Chinese Wall Security Policy Models: Information Flows and Confining Trojan HorsesLin, T. Y. et al. | 2004
- 288
-
RBAC Policy Implementation for SQL DatabasesBarker, S. / Douglas, P. et al. | 2004
- 302
-
An Administrative Model for Role GraphsWang, H. / Osborn, S. L. et al. | 2004
- 316
-
Safety and Liveness for an RBAC/MAC Security ModelPhillips, C. / Demurjian, S. / Ting, T. C. et al. | 2004
- 330
-
Schema Based XML Security: RBAC ApproachZhang, X. / Park, J. / Sandhu, R. et al. | 2004
- 344
-
Persistent versus Dynamic Role MembershipBacon, J. / Chadwick, D. W. / Otenko, O. / Moody, K. et al. | 2004
- 358
-
FlexFlow: A Flexible Flow Control Policy Specification FrameworkChen, S. / Wijesekera, D. / Jajodia, S. et al. | 2004
- 375
-
Data and Applications Security: Past, Present and the FutureThuraisingham, B. et al. | 2004
- 393
-
Digital Forensics: Operational, Legal, and Research IssuesPollitt, M. / Caloyannides, M. / Novotny, J. / Shenoi, S. et al. | 2004