IFIP TC6 Open Digital Library

20. DBSec 2006: Sophia Antipolis, France

Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings

Ernesto Damiani, Peng Liu

Springer, Lecture Notes in Computer Science 4127, ISBN: 3-540-36796-9


Creating Objects in the Flexible Authorization Framework.

Nicola Zannone, Sushil Jajodia, Duminda Wijesekera


Detection and Resolution of Anomalies in Firewall Policy Rules.

Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham


On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.

Joachim Biskup, Lena Wiese


Consolidating the Access Control of Composite Applications and Workflows.

Martin Wimmer 0001, Alfons Kemper, Maarten Rits, Volkmar Lotz


Authenticating Multi-dimensional Query Results in Data Publishing.

Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan


XML Streams Watermarking.

Julien Lafaye, David Gross-Amblard


Aggregation Queries in the Database-As-a-Service Model.

Einar Mykletun, Gene Tsudik


Policy Classes and Query Rewriting Algorithm for XML Security Views.

Nataliya Rassadko


Interactive Analysis of Attack Graphs Using Relational Queries.

Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia


Notarized Federated Identity Management for Web Services.

Michael T. Goodrich, Roberto Tamassia, Danfeng Yao


Resolving Information Flow Conflicts in RBAC Systems.

Noa Tuval, Ehud Gudes


Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.

Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann


Term Rewriting for Access Control.

Steve Barker, Maribel Fernández


Discretionary and Mandatory Controls for Role-Based Administration.

Jason Crampton


A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.

Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari


Enhancing User Privacy Through Data Handling Policies.

Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati


Efficient Enforcement of Security Policies Based on Tracking of Mobile Users.

Vijayalakshmi Atluri, Heechang Shin


A Framework for Flexible Access Control in Digital Library Systems.

Indrajit Ray, Sudip Chakraborty


Authrule: A Generic Rule-Based Authorization Module.

Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe


Aspect-Oriented Risk Driven Development of Secure Applications.

Geri Georg, Siv Hilde Houmb, Indrakshi Ray


From Business Process Choreography to Authorization Policies.

Philip Robinson, Florian Kerschbaum, Andreas Schaad


Information Theoretical Analysis of Two-Party Secret Computation.

Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu