Coverart for item
The Resource Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)

Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)

Label
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
Title
Data and applications security XXIII
Title remainder
23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
Statement of responsibility
Ehud Gudes, Jaideep Vaidya (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009. The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.D314
LC item number
I35 2009
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2009
http://bibfra.me/vocab/lite/meetingName
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Gudes, Ehud
  • Vaidya, Jaideep
Series statement
Lecture notes in computer science,
Series volume
5645
http://library.link/vocab/subjectName
  • Database security
  • Computer networks
  • Computers
  • Computers
  • Database security
  • Computer networks
  • Informatique
  • Computer networks
  • Computers
  • Database security
  • Abfrage
  • Anwendungssystem
  • Datenbanksystem
  • Datensicherung
  • Kryptoanalyse
  • Privatsphäre
  • Rechnernetz
  • Systemplattform
  • Trusted Computing
  • Zugriffskontrolle
Label
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)
Instantiates
Publication
Note
  • International conference proceedings
  • Copyright by IFIP International Federation for Information Processing
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications
Control code
437345745
Dimensions
unknown
Extent
1 online resource (xi, 314 pages)
Form of item
online
Isbn
9783642030062
Lccn
2009929941
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786612297984
  • 10.1007/978-3-642-03007-9
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-642-03006-2
Publisher number
12718412
Specific material designation
remote
System control number
(OCoLC)437345745
Label
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)
Publication
Note
  • International conference proceedings
  • Copyright by IFIP International Federation for Information Processing
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications
Control code
437345745
Dimensions
unknown
Extent
1 online resource (xi, 314 pages)
Form of item
online
Isbn
9783642030062
Lccn
2009929941
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786612297984
  • 10.1007/978-3-642-03007-9
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-642-03006-2
Publisher number
12718412
Specific material designation
remote
System control number
(OCoLC)437345745

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...