DBSec B

26 papers

YearTitle / Authors
2004A Design for Parameterized Roles.
Mei Ge, Sylvia L. Osborn
2004A Framework for Trusted Wireless Sensor Networks.
Joon S. Park, Abhishek Jain
2004A Pattern System for Access Control.
Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul
2004An Experimental Study of Distortion-Based Techniques for Association Rule Hiding.
Emmanuel D. Pontikakis, Achilleas A. Tsitsonis, Vassilios S. Verykios
2004An Extended Analysis of Delegating Obligations.
Andreas Schaad
2004Attribute Mutability in Usage Control.
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
2004Configuring Storage Area Networks for Mandatory Security.
Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart
2004Damage Discovery in Distributed Database Systems.
Yanjun Zuo, Brajendra Panda
2004Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
Yingjiu Li, Vipin Swarup, Sushil Jajodia
2004Efficient Verification of Delegation in Distributed Group Membership Management.
Ladislav Huraj, Helmut Reiser
2004Implementing Real-Time Update of Access Control Policies.
Indrakshi Ray, Tai Xin
2004Information Flow Analysis for File Systems and Databases Using Labels.
Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce
2004Invited Talk - Inference Control Problems in Statistical Database Query Systems.
Lawrence H. Cox
2004Invited Talk - Towards Semantics-Aware Access Control.
Ernesto Damiani, Sabrina De Capitani di Vimercati
2004On The Damage and Compensation of Privacy Leakage.
Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen
2004Performance-Conscious Key Management in Encrypted Databases.
Hakan Hacigümüs, Sharad Mehrotra
2004Policy-based Security Management for Enterprise Systems.
Ravi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley
2004Privacy-Preserving Multi-Party Decision Tree Induction.
Justin Zhijun Zhan, Liwu Chang, Stan Matwin
2004RBAC/MAC Security Analysis and Design for UML.
Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting
2004Refusal in Incomplete Databases.
Joachim Biskup, Torben Weibert
2004Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain
Csilla Farkas, Pierangela Samarati
2004STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations.
Vijayalakshmi Atluri, Qi Guo
2004Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones.
Inja Youn, Duminda Wijesekera
2004Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation.
Indrajit Ray, Tomas Hajek
2004Web Resource Usage Control in RSCLP.
Steve Barker
2004Why Is this User Asking so Many Questions? Explaining Sequences of Queries.
Aybar C. Acar, Amihai Motro