20. DBSec 2006: Sophia Antipolis, France
Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings
Ernesto Damiani, Peng Liu
Springer, Lecture Notes in Computer Science 4127, ISBN: 3-540-36796-9
Contents
Creating Objects in the Flexible Authorization Framework.
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
1-14
Detection and Resolution of Anomalies in Firewall Policy Rules.
Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham
15-29
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.
Joachim Biskup, Lena Wiese
30-43
Consolidating the Access Control of Composite Applications and Workflows.
Martin Wimmer 0001, Alfons Kemper, Maarten Rits, Volkmar Lotz
44-59
Authenticating Multi-dimensional Query Results in Data Publishing.
Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan
60-73
Interactive Analysis of Attack Graphs Using Relational Queries.
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
119-132
Notarized Federated Identity Management for Web Services.
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
133-147
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
163-178
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.
Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari
209-223
Enhancing User Privacy Through Data Handling Policies.
Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati
224-236
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users.
Vijayalakshmi Atluri, Heechang Shin
237-251
A Framework for Flexible Access Control in Digital Library Systems.
Indrajit Ray, Sudip Chakraborty
252-266
Authrule: A Generic Rule-Based Authorization Module.
Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe
267-281
Aspect-Oriented Risk Driven Development of Secure Applications.
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
282-296
From Business Process Choreography to Authorization Policies.
Philip Robinson, Florian Kerschbaum, Andreas Schaad
297-309
Information Theoretical Analysis of Two-Party Secret Computation.
Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu
310-317