16. DBSec 2002:
Cambridge,
UK
Ehud Gudes, Sujeet Shenoi (Eds.):
Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK.
IFIP Conference Proceedings 256 Kluwer 2003, ISBN 1-4020-7541-3 @proceedings{DBLP:conf/dbsec/2002,
editor = {Ehud Gudes and
Sujeet Shenoi},
title = {Research Directions in Data and Applications Security, IFIP WG
11.3 Sixteenth International Conference on Data and Applications
Security, July 28-31, 2002, Kings College, Cambridge, UK},
booktitle = {DBSec},
publisher = {Kluwer},
series = {IFIP Conference Proceedings},
volume = {256},
year = {2003},
isbn = {1-4020-7541-3},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Role-Based Access Control
- András Belokosztolszki, David M. Eyers:
Shielding RBAC Infrastructures from Cyberterrorism.
3-14
- Cecilia Ionita, Sylvia L. Osborn:
Privilege Administration for the Role Graph Model.
15-25
- Steve Barker, Paul Douglas, Terry Fanning:
Implementing RBAC Policies.
27-36
- M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Role Delegation for a Resource-Based Security Model.
37-48
- Dongwan Shin, Gail-Joon Ahn, Sangrae Cho:
Using X.509 Attribute Certificates for Role-Based EAM.
49-60
- Lucas C. J. Dreyer, Martin S. Olivier:
Implementing Workflow Systems.
61-72
Database Security
XML Security
Data Mining and Inference
Multimedia System Security
Network Security
Public Key Infrastructure
Formal Methods and Protocols
Security and Privacy
Copyright © Sun Mar 14 23:00:25 2010
by Michael Ley (ley@uni-trier.de)