Data and Applications Security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008, Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practic...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Atluri, Vijay (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2008, 2008
Edition:1st ed. 2008
Series:Information Systems and Applications, incl. Internet/Web, and HCI
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03790nmm a2200409 u 4500
001 EB000378156
003 EBX01000000000000000231208
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783540705673 
100 1 |a Atluri, Vijay  |e [editor] 
245 0 0 |a Data and Applications Security XXII  |h Elektronische Ressource  |b 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008, Proceedings  |c edited by Vijay Atluri 
250 |a 1st ed. 2008 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2008, 2008 
300 |a XI, 352 p  |b online resource 
505 0 |a A New Privacy Model for XML -- Privacy-Aware Collaborative Access Control in Web-Based Social Networks -- A Privacy-Preserving Ticketing System -- The Analysis of Windows Vista Disk Encryption Algorithm -- Shared and Searchable Encrypted Data for Untrusted Servers -- Secure Construction of Contingency Tables from Distributed Data -- Web Services Security: Techniques and Challenges (Extended Abstract) -- Empirical Analysis of Certificate Revocation Lists -- Using New Tools for Certificate Repositories Generation in MANETs -- Privacy II -- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure -- Protecting the Publishing Identity in Multiple Tup 
653 |a Computer Communication Networks 
653 |a Computer security 
653 |a Information Systems 
653 |a Systems and Data Security 
653 |a Software engineering 
653 |a Computer Communication Networks 
653 |a Cryptology 
653 |a Data encryption (Computer science) 
653 |a Computer software 
653 |a Management of Computing and Information Systems 
653 |a Algorithm Analysis and Problem Complexity 
653 |a Special Purpose and Application-Based Systems 
710 2 |a SpringerLink (Online service) 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Information Systems and Applications, incl. Internet/Web, and HCI 
856 |u https://doi.org/10.1007/978-3-540-70567-3?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 high-quality research papers, which were selected from a total of 56 submissions after a rigorous reviewing process by the Program Committee members and external reviewers. These sessions included such topics as access control, privacy, auditing, systems security and data security in advanced app- cation domains. In addition, the programincluded a keynote address, an invited talk and a panel session. The success of this conference was a result of the e?orts of many people. I would like to extend my appreciation to the Program Committee members and external reviewers for their hard work. I would like to thank the General Chair, SteveBarker,fortakingcareoftheorganizationaspectsoftheconferenceandfor arranging the keynote address and the panel session. I would also like to thank Claudio Ardagna for serving as the Publicity Chair and for promptly updating the conference Web page, and Don Lokuadassuriyage for serving as the Local Arrangements Chair. Special thanks go to Alfred Hofmann, Editorial Director at Springer, for agreeing to include these conference proceedings in the Lecture Notes in Computer Science series