The Resource Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)
Resource Information
The item Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009. The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing
- Language
- eng
- Extent
- 1 online resource (xi, 314 pages)
- Note
-
- International conference proceedings
- Copyright by IFIP International Federation for Information Processing
- Contents
-
- Database Security I
- Controlled Query Evaluation and Inference-Free View Updates
- Implementing Reflective Access Control in SQL
- Security Policies
- An Approach to Security Policy Configuration Using Semantic Threat Graphs
- Reaction Policy Model Based on Dynamic Organizations and Threat Context
- Towards System Integrity Protection with Graph-Based Policy Analysis
- Privacy I
- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation
- Privacy-Preserving Telemonitoring for eHealth
- Intrusion Detection and Protocols
- Analysis of Data Dependency Based Intrusion Detection System
- Secure Method Calls by Instrumenting Bytecode with Aspects
- Access Control
- Distributed Privilege Enforcement in PACS
- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates
- Using Edit Automata for Rewriting-Based Security Enforcement
- Privacy II
- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers
- Detecting Inference Channels in Private Multimedia Data via Social Networks
- Database Security II
- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
- Data Is Key: Introducing the Data-Based Access Control Paradigm
- Trusted Computing
- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology
- PAES: Policy-Based Authority Evaluation Scheme
- Short Papers
- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC
- Methods for Computing Trust and Reputation While Preserving Privacy
- Building an Application Data Behavior Model for Intrusion Detection
- A Trust-Based Access Control Model for Pervasive Computing Applications
- Isbn
- 9783642030062
- Label
- Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
- Title
- Data and applications security XXIII
- Title remainder
- 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
- Statement of responsibility
- Ehud Gudes, Jaideep Vaidya (eds.)
- Subject
-
- Anwendungssystem
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Database security
- Database security
- Database security
- Database security -- Congresses
- Datenbanksystem
- Datensicherung
- Informatique
- Kryptoanalyse
- Privatsphäre
- Rechnernetz
- Systemplattform
- Trusted Computing
- Zugriffskontrolle
- Abfrage
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009. The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.D314
- LC item number
- I35 2009
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2009
- http://bibfra.me/vocab/lite/meetingName
- Annual IFIP WG 11.3 Working Conference on Data and Applications Security
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Gudes, Ehud
- Vaidya, Jaideep
- Series statement
- Lecture notes in computer science,
- Series volume
- 5645
- http://library.link/vocab/subjectName
-
- Database security
- Computer networks
- Computers
- Computers
- Database security
- Computer networks
- Informatique
- Computer networks
- Computers
- Database security
- Abfrage
- Anwendungssystem
- Datenbanksystem
- Datensicherung
- Kryptoanalyse
- Privatsphäre
- Rechnernetz
- Systemplattform
- Trusted Computing
- Zugriffskontrolle
- Label
- Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)
- Note
-
- International conference proceedings
- Copyright by IFIP International Federation for Information Processing
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications
- Control code
- 437345745
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 314 pages)
- Form of item
- online
- Isbn
- 9783642030062
- Lccn
- 2009929941
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9786612297984
- 10.1007/978-3-642-03007-9
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-642-03006-2
- Publisher number
- 12718412
- Specific material designation
- remote
- System control number
- (OCoLC)437345745
- Label
- Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)
- Note
-
- International conference proceedings
- Copyright by IFIP International Federation for Information Processing
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications
- Control code
- 437345745
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 314 pages)
- Form of item
- online
- Isbn
- 9783642030062
- Lccn
- 2009929941
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9786612297984
- 10.1007/978-3-642-03007-9
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-642-03006-2
- Publisher number
- 12718412
- Specific material designation
- remote
- System control number
- (OCoLC)437345745
Subject
- Anwendungssystem
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Database security
- Database security
- Database security
- Database security -- Congresses
- Datenbanksystem
- Datensicherung
- Informatique
- Kryptoanalyse
- Privatsphäre
- Rechnernetz
- Systemplattform
- Trusted Computing
- Zugriffskontrolle
- Abfrage
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Data-and-applications-security-XXIII--23rd/nV3t2RHyR9A/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Data-and-applications-security-XXIII--23rd/nV3t2RHyR9A/">Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Data-and-applications-security-XXIII--23rd/nV3t2RHyR9A/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Data-and-applications-security-XXIII--23rd/nV3t2RHyR9A/">Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings, Ehud Gudes, Jaideep Vaidya (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>