Data and Applications Security XX
Springer Berlin (Verlag)
978-3-540-36796-3 (ISBN)
Ernesto Damiani is a professor at the Department of Information Technology of the University of Milan. He is the Vice-Chair of the ACM Special Interest Group on Applied Computing (SIGAPP).
Creating Objects in the Flexible Authorization Framework.- Detection and Resolution of Anomalies in Firewall Policy Rules.- On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.- Consolidating the Access Control of Composite Applications and Workflows.- Authenticating Multi-dimensional Query Results in Data Publishing.- Xml Streams Watermarking.- Aggregation Queries in the Database-As-a-Service Model.- Policy Classes and Query Rewriting Algorithm for XML Security Views.- Interactive Analysis of Attack Graphs Using Relational Queries.- Notarized Federated Identity Management for Web Services.- Resolving Information Flow Conflicts in RBAC Systems.- Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.- Term Rewriting for Access Control.- Discretionary and Mandatory Controls for Role-Based Administration.- A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.- Enhancing User Privacy Through Data Handling Policies.- Efficient Enforcement of Security Policies Based on Tracking of Mobile Users.- A Framework for Flexible Access Control in Digital Library Systems.- Authrule: A Generic Rule-Based Authorization Module.- Aspect-Oriented Risk Driven Development of Secure Applications.- From Business Process Choreography to Authorization Policies.- Information Theoretical Analysis of Two-Party Secret Computation.
Erscheint lt. Verlag | 18.7.2006 |
---|---|
Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
Zusatzinfo | X, 319 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 506 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Administration • algorithm • Algorithm analysis and problem complexity • algorithms • authentication • authorization • concurrency control • cryptography • Information • integrity maintenance • privacy • Registry • Resolution • Risk Management • secure information integration • security • security assessment • security planning and administration • security tradeoffs • semantic web • semantic web services • User Tracking • web application security • XML • xml security • XML watermarking |
ISBN-10 | 3-540-36796-9 / 3540367969 |
ISBN-13 | 978-3-540-36796-3 / 9783540367963 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich