Data and applications security XIX
Autoren
Mehr zum Buch
InhaltsverzeichnisStreams, Security and Scalability.Towards Privacy-Enhanced Authorization Policies and Languages.Revocation of Obligation and Authorisation Policy Objects.Role Slices: A Notation for RBAC Permission Assignment and Enforcement.Designing Secure Indexes for Encrypted Databases.Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.Verified Query Results from Hybrid Authentication Trees.Multilevel Secure Teleconferencing over Public Switched Telephone Network.Secrecy of Two-Party Secure Computation.Reliable Scheduling of Advanced Transactions.Privacy-Preserving Decision Trees over Vertically Partitioned Data.Privacy-Preserving Collaborative Association Rule Mining.Privacy-Preserving Distributed k-Anonymity.Towards Database Firewalls.Complete Redundancy Detection in Firewalls.A Comprehensive Approach to Anomaly Detection in Relational Databases.An Authorization Architecture for Web Services.Secure Model Management Operations for the Web.A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.Secure Mediation with Mobile Code.Security Vulnerabilities in Software Systems: A Quantitative Perspective.Trading Off Security in a Service Oriented Architecture.Trusted Identity and Session Management Using Secure Cookies.Security Issues in Querying Encrypted Data.Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.