IFIP TC6 Open Digital Library

20. DBSec 2006: Sophia Antipolis, France

Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings

Ernesto Damiani, Peng Liu

Springer, Lecture Notes in Computer Science 4127, ISBN: 3-540-36796-9



Contents

Creating Objects in the Flexible Authorization Framework.

Nicola Zannone, Sushil Jajodia, Duminda Wijesekera

 1-14

Detection and Resolution of Anomalies in Firewall Policy Rules.

Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham

 15-29

On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.

Joachim Biskup, Lena Wiese

 30-43

Consolidating the Access Control of Composite Applications and Workflows.

Martin Wimmer 0001, Alfons Kemper, Maarten Rits, Volkmar Lotz

 44-59

Authenticating Multi-dimensional Query Results in Data Publishing.

Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan

 60-73

XML Streams Watermarking.

Julien Lafaye, David Gross-Amblard

 74-88

Aggregation Queries in the Database-As-a-Service Model.

Einar Mykletun, Gene Tsudik

 89-103

Policy Classes and Query Rewriting Algorithm for XML Security Views.

Nataliya Rassadko

 104-118

Interactive Analysis of Attack Graphs Using Relational Queries.

Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia

 119-132

Notarized Federated Identity Management for Web Services.

Michael T. Goodrich, Roberto Tamassia, Danfeng Yao

 133-147

Resolving Information Flow Conflicts in RBAC Systems.

Noa Tuval, Ehud Gudes

 148-162

Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.

Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann

 163-178

Term Rewriting for Access Control.

Steve Barker, Maribel Fernández

 179-193

Discretionary and Mandatory Controls for Role-Based Administration.

Jason Crampton

 194-208

A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.

Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari

 209-223

Enhancing User Privacy Through Data Handling Policies.

Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati

 224-236

Efficient Enforcement of Security Policies Based on Tracking of Mobile Users.

Vijayalakshmi Atluri, Heechang Shin

 237-251

A Framework for Flexible Access Control in Digital Library Systems.

Indrajit Ray, Sudip Chakraborty

 252-266

Authrule: A Generic Rule-Based Authorization Module.

Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe

 267-281

Aspect-Oriented Risk Driven Development of Secure Applications.

Geri Georg, Siv Hilde Houmb, Indrakshi Ray

 282-296

From Business Process Choreography to Authorization Policies.

Philip Robinson, Florian Kerschbaum, Andreas Schaad

 297-309

Information Theoretical Analysis of Two-Party Secret Computation.

Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu

 310-317