×
Loading...

Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA by IFIP TC11/WG11.3 Annual Working Conferen...

Book Information

TitleData and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA
CreatorIFIP TC11/WG11.3 Annual Working Conference on Data and Applications Security (17th : 2003 : Estes Park, Col.), De Capitani di Vimercati, Sabrina, Ray, Indrakshi, Ray, Indrajit
Year2004
PPI112
PublisherBoston : Kluwer Academic Publishers
LanguageEnglish
Mediatypetexts
SubjectDatabase security
ISBN1402080697, 1402080700
Collectionfolkscanomy_miscellaneous, folkscanomy, additional_collections
Uploadersketch
Identifierspringer_10.1007-b116220
Telegram icon Share on Telegram
Download Now

Description

Data and Applications Security XVII: Status and ProspectsAuthor: Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray Published by Springer US ISBN: 978-1-4020-8069-2 DOI: 10.1007/b116220Table of Contents:Remote Computer Fingerprinting for Cyber Crime Investigations Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases Delivering Services with Integrity Guarantees in Survivable Database Systems Certifying Data from Multiple Sources Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model Adapting Query Optimization Techniques for Efficient Alert Correlation Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases Privacy Under Conditions of Concurrent Interaction with Multiple Parties Correlated Data Inference Anti-Tamper Databases Administration Rights in the SDSD-System Secure Authorisation for Web Services A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities Supporting Delegation in Secure Workflow Management Systems Modifying LDAP to Support PKI ECPV: EFficient Certificate Path Validation in Public-Key Infrastructure Semantics-Aware Perimeter Protection Systematic Development of a Family of Fair Exchange Protocols High-Speed Access Control for XML Documents Chinese Wall Security Policy Models, Includes bibliographical references and index