Coverart for item
The Resource Data and Applications Security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings, edited by Sushil Jajodia, Duminda Wijesekera, (electronic resource)

Data and Applications Security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings, edited by Sushil Jajodia, Duminda Wijesekera, (electronic resource)

Label
Data and Applications Security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings
Title
Data and Applications Security XIX
Title remainder
19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings
Statement of responsibility
edited by Sushil Jajodia, Duminda Wijesekera
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
This book constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, CT, USA, in August 2005. The 24 revised full papers presented together with an invited lecture were thoroughly reviewed and selected from 54 submissions. The papers present theory, technique, applications, and practical experience of data and application security with topics like cryptography, privacy, security planning and administration, secure information integration, secure semantic Web technologies and applications, access control, integrity maintenance, knowledge discovery and privacy, concurrency control, fault-tolerance and recovery methods
Member of
http://library.link/vocab/creatorName
Jajodia, Sushil
Image bit depth
0
LC call number
QA76.9.A25
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • Wijesekera, Duminda.
  • SpringerLink
Series statement
Lecture Notes in Computer Science,
Series volume
3654
http://library.link/vocab/subjectName
  • Computer science
  • Computer Communication Networks
  • Software engineering
  • Operating systems (Computers)
  • Data encryption (Computer science)
  • Computer software
  • Information Systems
  • Computer Science
  • Data Encryption
  • Computer Communication Networks
  • Special Purpose and Application-Based Systems
  • Operating Systems
  • Algorithm Analysis and Problem Complexity
  • Management of Computing and Information Systems
Label
Data and Applications Security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings, edited by Sushil Jajodia, Duminda Wijesekera, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Results from Hybrid Authentication Trees -- Multilevel Secure Teleconferencing over Public Switched Telephone Network -- Secrecy of Two-Party Secure Computation -- Reliable Scheduling of Advanced Transactions -- Privacy-Preserving Decision Trees over Vertically Partitioned Data -- Privacy-Preserving Collaborative Association Rule Mining -- Privacy-Preserving Distributed k-Anonymity -- Towards Database Firewalls -- Complete Redundancy Detection in Firewalls -- A Comprehensive Approach to Anomaly Detection in Relational Databases -- An Authorization Architecture for Web Services -- Secure Model Management Operations for the Web -- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions -- Secure Mediation with Mobile Code -- Security Vulnerabilities in Software Systems: A Quantitative Perspective -- Trading Off Security in a Service Oriented Architecture -- Trusted Identity and Session Management Using Secure Cookies -- Security Issues in Querying Encrypted Data -- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption
Dimensions
unknown
Extent
X, 353 p. Also available online.
File format
multiple file formats
Form of item
electronic
Isbn
9783540319375
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/11535706
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-31937-5
Label
Data and Applications Security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings, edited by Sushil Jajodia, Duminda Wijesekera, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Results from Hybrid Authentication Trees -- Multilevel Secure Teleconferencing over Public Switched Telephone Network -- Secrecy of Two-Party Secure Computation -- Reliable Scheduling of Advanced Transactions -- Privacy-Preserving Decision Trees over Vertically Partitioned Data -- Privacy-Preserving Collaborative Association Rule Mining -- Privacy-Preserving Distributed k-Anonymity -- Towards Database Firewalls -- Complete Redundancy Detection in Firewalls -- A Comprehensive Approach to Anomaly Detection in Relational Databases -- An Authorization Architecture for Web Services -- Secure Model Management Operations for the Web -- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions -- Secure Mediation with Mobile Code -- Security Vulnerabilities in Software Systems: A Quantitative Perspective -- Trading Off Security in a Service Oriented Architecture -- Trusted Identity and Session Management Using Secure Cookies -- Security Issues in Querying Encrypted Data -- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption
Dimensions
unknown
Extent
X, 353 p. Also available online.
File format
multiple file formats
Form of item
electronic
Isbn
9783540319375
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/11535706
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-540-31937-5

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...