14. DBSec 2000:
Schoorl / Amsterdam,
The Netherlands
Bhavani M. Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, Zahir Tari (Eds.):
Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000.
IFIP Conference Proceedings 201 Kluwer 2001, ISBN 0-7923-7514-9 @proceedings{DBLP:conf/dbsec/2000,
editor = {Bhavani M. Thuraisingham and
Reind P. van de Riet and
Klaus R. Dittrich and
Zahir Tari},
title = {Data and Application Security, Development and Directions, IFIP
TC11/ WG11.3 Fourteenth Annual Working Conference on Database
Security, Schoorl, The Netherlands, August 21-23, 2000},
booktitle = {DBSec},
publisher = {Kluwer},
series = {IFIP Conference Proceedings},
volume = {201},
year = {2001},
isbn = {0-7923-7514-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Gio Wiederhold:
Protecting Information when Access is Granted for Collaboration.
1-14
- Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, Marco Mesiti:
Author-X: A Java-Based System for XML Data Protection.
15-26
- Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy:
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution.
27-38
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:
XML Access Control Systems: A Component-Based Approach.
39-50
- Alexandre Hardy, Martin S. Olivier:
A Configurable Security Architecture Prototype.
51-62
- Susan Chapin, Donald B. Faatz, Sushil Jajodia:
Distributed Policies for Data Management Making Policies Mobile.
63-76
- Christian Altenschmidt, Joachim Biskup, Yücel Karabulut:
Security Architecture of the Multimedia Mediator.
77-88
- Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi:
Simulation and Analysis of Cryptographic Protocols.
89-100
- Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine:
Authentic Third-party Data Publication.
101-112
- Daniel Barbará, Rajni Goel, Sushil Jajodia:
Protecting File systems Against Corruption Using Checksums.
113-124
- Bhavani M. Thuraisingham:
Web Security and Privacy (Panel).
125-126
- Ken Moody:
Coordinating Policy for Federated Applications.
127-134
- Marta Oliva, Fèlix Saltor:
Integrating Security Policies in Federated Database Systems.
135-148
- Martin S. Olivier, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications.
149-160
- LiWu Chang, Ira S. Moskowitz:
An Integrated Framework for Database Privacy Protection.
161-172
- Christina Yip Chung, Michael Gertz, Karl N. Levitt:
Discovery of Multi-Level Security Policies.
173-184
- Steve Barker:
Protecting Deductive Databases from Unauthorized Retrievals.
185-196
- Adrian Spalka, Armin B. Cremers:
Confidentiality vs. Integrity in Secure Databases.
197-208
- Arnon Rosenthal, Edward Sciore:
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges.
209-220
- John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi:
Language Extensions for Programmable Security.
221-232
- Soon Ae Chun, Vijayalakshmi Atluri:
Protecting Privacy from Continuous High-resolution Satellite Surveillance.
233-244
- Sylvia L. Osborn:
Database Security Integration using Role-Based Access Control.
245-258
- Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr:
Role-Based Security in a Distributed Resource Environment.
259-270
- Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in using Databases.
271-282
- Jürgen Steger, Holger Günzel, Andreas Bauer:
Identifying Security Holes in OLAP Applications.
283-294
- Marc Donner, David Nochin, Dennis Shasha, Wendy Walasek:
Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations.
195-316
- John R. Campbell:
Database Security 2000.
317-322
- Hasan M. Jamil:
Declarative Semantics of Belief Queries in MLS Deductive Databases.
323-328
- James Bret Michael, Leonard T. Gaines:
Trust Management in Distributed Databases.
329-338
- Daniel Cvrcek:
Active Access Control as High-Level Control.
339-346
- Ari Moesriami Barmawi, Shingo Takada, Norihisa Doi:
Conference Key Agreement Protocol Using Oblivious Transfer.
347-354
- Sejong Oh, Seog Park:
An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task.
355-360
- Keiji Izaki, Katsuya Tanaka, Makoto Takizawa:
Access Control Model in Object-Oriented Systems.
361-366
- Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold:
Panel.
373
Copyright © Sun Mar 14 23:00:25 2010
by Michael Ley (ley@uni-trier.de)