Coverart for item
The Resource Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings, Vijay Atluri (ed.)

Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings, Vijay Atluri (ed.)

Label
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings
Title
Data and applications security XXII
Title remainder
22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings
Statement of responsibility
Vijay Atluri (ed.)
Title variation
  • IFIP WG 11.3 Working Conference on Data and Applications Security
  • 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Creator
Contributor
Subject
Genre
Language
eng
Summary
Annotation This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008. The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems
Member of
Cataloging source
GW5XE
Dewey number
004
Illustrations
illustrations
Index
index present
Language note
English
LC call number
QA76.9.D314
LC item number
I34 2008eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2008
http://bibfra.me/vocab/lite/meetingName
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1956-
http://library.link/vocab/relatedWorkOrContributorName
Atluri, Vijay
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI
Series volume
5094
http://library.link/vocab/subjectName
  • Electronic data processing
  • Internet
  • Electronic commerce
  • Database security
  • Electronic Data Processing
  • Computer Security
  • Informatique
  • Database security
  • Electronic commerce
  • Electronic data processing
  • Internet
Label
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings, Vijay Atluri (ed.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
mixed
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Dynamic meta-level access control in SQL -- On the formal analysis of a spatio-temporal role-based access control model -- A unified audit expression model for auditing SQL queries -- A new approach to secure logging -- Security, functionality and scale? -- P4A: A new privacy model for XML -- Privacy-aware collaborative access control in web-based social networks -- A privacy-preserving ticketing system -- The analysis of windows vista disk encryption algorithm -- Shared and searchable encrypted data for untrusted servers -- Secure construction of contingency tables from distributed data -- Web services security: Techniques and challenges (extended abstract) -- Empirical analysis of certificate revocation lists -- Using new tools for certificate repositories generation in MANETs -- Exclusive strategy for generalization algorithms in micro-data disclosure -- Protecting the publishing identity in multiple tuples -- Panel session: What are the key challenges in distributed security? -- On the applicability of trusted computing in distributed authorization using web services -- Sharing but protecting content against internal leakage for organisations -- Regulating exceptions in healthcare using policy spaces -- Towards automation of testing high-level security properties -- An attack graph-based probabilistic security metric -- An opinion model for evaluating malicious activities in pervasive computing systems -- DIWeDa -- detecting intrusions in web databases -- Securing workflows with XACML, RDF and BPEL
Control code
272298870
Dimensions
unknown
Extent
1 online resource (xi, 345 pages)
Form of item
online
Isbn
9783540705673
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-540-70567-3.
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)272298870
Label
Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings, Vijay Atluri (ed.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
mixed
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Dynamic meta-level access control in SQL -- On the formal analysis of a spatio-temporal role-based access control model -- A unified audit expression model for auditing SQL queries -- A new approach to secure logging -- Security, functionality and scale? -- P4A: A new privacy model for XML -- Privacy-aware collaborative access control in web-based social networks -- A privacy-preserving ticketing system -- The analysis of windows vista disk encryption algorithm -- Shared and searchable encrypted data for untrusted servers -- Secure construction of contingency tables from distributed data -- Web services security: Techniques and challenges (extended abstract) -- Empirical analysis of certificate revocation lists -- Using new tools for certificate repositories generation in MANETs -- Exclusive strategy for generalization algorithms in micro-data disclosure -- Protecting the publishing identity in multiple tuples -- Panel session: What are the key challenges in distributed security? -- On the applicability of trusted computing in distributed authorization using web services -- Sharing but protecting content against internal leakage for organisations -- Regulating exceptions in healthcare using policy spaces -- Towards automation of testing high-level security properties -- An attack graph-based probabilistic security metric -- An opinion model for evaluating malicious activities in pervasive computing systems -- DIWeDa -- detecting intrusions in web databases -- Securing workflows with XACML, RDF and BPEL
Control code
272298870
Dimensions
unknown
Extent
1 online resource (xi, 345 pages)
Form of item
online
Isbn
9783540705673
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-540-70567-3.
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)272298870

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...