DBSec B

26 papers

YearTitle / Authors
2005A Comprehensive Approach to Anomaly Detection in Relational Databases.
Adrian Spalka, Jan Lehnhardt
2005A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.
Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
2005An Authorization Architecture for Web Services.
Sarath Indrakanti, Vijay Varadharajan
2005Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
Amihai Motro, Francesco Parisi-Presicce
2005Complete Redundancy Detection in Firewalls.
Alex X. Liu, Mohamed G. Gouda
2005Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings
Sushil Jajodia, Duminda Wijesekera
2005Designing Secure Indexes for Encrypted Databases.
Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes
2005Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.
Jun Li, Edward Omiecinski
2005Multilevel Secure Teleconferencing over Public Switched Telephone Network.
Inja Youn, Csilla Farkas, Bhavani Thuraisingham
2005Privacy-Preserving Collaborative Association Rule Mining.
Justin Zhijun Zhan, Stan Matwin, Liwu Chang
2005Privacy-Preserving Decision Trees over Vertically Partitioned Data.
Jaideep Vaidya, Chris Clifton
2005Privacy-Preserving Distributed k-Anonymity.
Wei Jiang, Chris Clifton
2005Reliable Scheduling of Advanced Transactions.
Tai Xin, Yajie Zhu, Indrakshi Ray
2005Revocation of Obligation and Authorisation Policy Objects.
Andreas Schaad
2005Role Slices: A Notation for RBAC Permission Assignment and Enforcement.
Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting
2005Secrecy of Two-Party Secure Computation.
Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
2005Secure Mediation with Mobile Code.
Joachim Biskup, Barbara Sprick, Lena Wiese
2005Secure Model Management Operations for the Web.
Guang-Lei Song, Kang Zhang, Bhavani Thuraisingham, Jun Kong
2005Security Issues in Querying Encrypted Data.
Murat Kantarcioglu, Chris Clifton
2005Security Vulnerabilities in Software Systems: A Quantitative Perspective.
Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray
2005Streams, Security and Scalability.
Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck, Divesh Srivastava
2005Towards Database Firewalls.
Kun Bai, Alex Hai Wang, Peng Liu
2005Towards Privacy-Enhanced Authorization Policies and Languages.
Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
2005Trading Off Security in a Service Oriented Architecture.
Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert
2005Trusted Identity and Session Management Using Secure Cookies.
Joon S. Park, Harish S. Krishnan
2005Verified Query Results from Hybrid Authentication Trees.
Glen Nuckolls