Data and Applications Security XXII 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008, Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practic...

Full description

Bibliographic Details
Other Authors: Atluri, Vijay (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2008, 2008
Edition:1st ed. 2008
Series:Information Systems and Applications, incl. Internet/Web, and HCI
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Access Control
  • Dynamic Meta-level Access Control in SQL
  • On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
  • Audit and Logging
  • A Unified Audit Expression Model for Auditing SQL Queries
  • A New Approach to Secure Logging
  • Keynote
  • Security, Functionality and Scale?
  • Privacy I
  • P4A: A New Privacy Model for XML
  • Privacy-Aware Collaborative Access Control in Web-Based Social Networks
  • A Privacy-Preserving Ticketing System
  • The Analysis of Windows Vista Disk Encryption Algorithm
  • Shared and Searchable Encrypted Data for Untrusted Servers
  • Secure Construction of Contingency Tables from Distributed Data
  • Web Services Security: Techniques and Challenges (Extended Abstract)
  • Empirical Analysis of Certificate Revocation Lists
  • Using New Tools for Certificate Repositories Generation in MANETs
  • Privacy II
  • Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
  • Protecting the Publishing Identity in Multiple Tuples
  • Panel Session: What Are the Key Challenges in Distributed Security?
  • On the Applicability of Trusted Computing in Distributed Authorization Using Web Services
  • Sharing but Protecting Content Against Internal Leakage for Organisations
  • Regulating Exceptions in Healthcare Using Policy Spaces
  • Towards Automation of Testing High-Level Security Properties
  • An Attack Graph-Based Probabilistic Security Metric
  • An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
  • DIWeDa - Detecting Intrusions in Web Databases
  • Securing Workflows with XACML, RDF and BPEL.