DBSec B

29 papers

YearTitle / Authors
2004Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA
Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray
2003A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini
2003Adapting Query Optimization Techniques for Efficient Alert Correlation.
Peng Ning, Dingbang Xu
2003Administration Rights in the SDSD-System.
Joachim Biskup, Thomas Leineweber, Joerg Parthe
2003An Administrative Model for Role Graphs.
He Wang, Sylvia L. Osborn
2003Anti-Tamper Databases: Querying Encrypted Databases.
Gultekin Özsoyoglu, David A. Singer, Sun S. Chung
2003Certifying Data from Multiple Sources.
Glen Nuckolls, Charles U. Martel, Stuart G. Stubblebine
2003Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses.
Tsau Young Lin
2003Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases.
Ehud Gudes, Boris Rozenberg
2003Correlated Data Inference.
Csilla Farkas, Andrei Stoica
2003Data and Applications Security: Past, Present and the Future.
Bhavani Thuraisingham
2003Delivering Services with Integrity Guarantees in Survivable Database Systems.
Jianyong Zhang, Peng Liu
2003Digital Forensics: Operational, Legal, and Research Issues.
Mark Pollitt, Michael A. Caloyannides, Jon Novotny, Sujeet Shenoi
2003ECPV: Efficient Certificate Path Validation in Public-key Infrastructure.
Mahantesh Halappanavar, Ravi Mukkamala
2003Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model.
Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra
2003FlexFlow: A Flexible Flow Control Policy Specification Framework.
Shiping Chen, Duminda Wijesekera, Sushil Jajodia
2003High-speed Access Control for XML Documents.
Jong P. Yoon
2003Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases.
Prahalad Ragothaman, Brajendra Panda
2003Modifying LDAP to Support PKI.
David W. Chadwick, Edward Ball, M. V. Sahalayev
2003Persistent versus Dynamic Role Membership.
Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody
2003Privacy under Conditions of Concurrent Interaction with Multiple Parties.
Martin S. Olivier
2003RBAC Policy Implementation for SQL Databases.
Steve Barker, Paul Douglas
2003Remote Computer Fingerprinting for Cyber Crime Investigations.
Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi
2003Safety and Liveness for an RBAC/MAC Security Model.
Charles E. Phillips, Steven A. Demurjian, T. C. Ting
2003Schema Based XML Security: RBAC Approach.
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
2003Secure Authorisation for Web Services.
Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi
2003Semantics-Aware Perimeter Protection.
Marco Cremonini, Ernesto Damiani, Pierangela Samarati
2003Supporting Delegation in Secure Workflow Management Systems.
Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni
2003Systematic Development of a Family of Fair Exchange Protocols.
Paul D. Ezhilchelvan, Santosh K. Shrivastava