19. DBSec 2005:
Storrs,
CT,
USA
Sushil Jajodia, Duminda Wijesekera (Eds.):
Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings.
Lecture Notes in Computer Science 3654 Springer 2005, ISBN 3-540-28138-X
- Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck, Divesh Srivastava:
Streams, Security and Scalability.
1-15
- Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Towards Privacy-Enhanced Authorization Policies and Languages.
16-27
- Andreas Schaad:
Revocation of Obligation and Authorisation Policy Objects.
28-39
- Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting:
Role Slices: A Notation for RBAC Permission Assignment and Enforcement.
40-53
- Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes:
Designing Secure Indexes for Encrypted Databases.
54-68
- Jun Li, Edward Omiecinski:
Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.
69-83
- Glen Nuckolls:
Verified Query Results from Hybrid Authentication Trees.
84-98
- Inja Youn, Csilla Farkas, Bhavani M. Thuraisingham:
Multilevel Secure Teleconferencing over Public Switched Telephone Network.
99-113
- Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu:
Secrecy of Two-Party Secure Computation.
114-123
- Tai Xin, Yajie Zhu, Indrakshi Ray:
Reliable Scheduling of Advanced Transactions.
124-138
- Jaideep Vaidya, Chris Clifton:
Privacy-Preserving Decision Trees over Vertically Partitioned Data.
139-152
- Justin Z. Zhan, Stan Matwin, LiWu Chang:
Privacy-Preserving Collaborative Association Rule Mining.
153-165
- Wei Jiang, Chris Clifton:
Privacy-Preserving Distributed k-Anonymity.
166-177
- Kun Bai, Hai Wang, Peng Liu:
Towards Database Firewalls.
178-192
- Alex X. Liu, Mohamed G. Gouda:
Complete Redundancy Detection in Firewalls.
193-206
- Adrian Spalka, Jan Lehnhardt:
A Comprehensive Approach to Anomaly Detection in Relational Databases.
207-221
- Sarath Indrakanti, Vijay Varadharajan:
An Authorization Architecture for Web Services.
222-236
- Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingham, Jun Kong:
Secure Model Management Operations for the Web.
237-251
- Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala:
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.
252-266
- Joachim Biskup, Barbara Sprick, Lena Wiese:
Secure Mediation with Mobile Code.
267-280
- Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray:
Security Vulnerabilities in Software Systems: A Quantitative Perspective.
281-294
- Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert:
Trading Off Security in a Service Oriented Architecture.
295-309
- Joon S. Park, Harish S. Krishnan:
Trusted Identity and Session Management Using Secure Cookies.
310-324
- Murat Kantarcioglu, Chris Clifton:
Security Issues in Querying Encrypted Data.
325-337
- Amihai Motro, Francesco Parisi-Presicce:
Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
338-352
Copyright © Sun Mar 14 23:00:25 2010
by Michael Ley (ley@uni-trier.de)