DBSec B

23 papers

YearTitle / Authors
2006A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.
Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari
2006A Framework for Flexible Access Control in Digital Library Systems.
Indrajit Ray, Sudip Chakraborty
2006Aggregation Queries in the Database-As-a-Service Model.
Einar Mykletun, Gene Tsudik
2006Aspect-Oriented Risk Driven Development of Secure Applications.
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
2006Authenticating Multi-dimensional Query Results in Data Publishing.
Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan
2006Authrule: A Generic Rule-Based Authorization Module.
Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe
2006Consolidating the Access Control of Composite Applications and Workflows.
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz
2006Creating Objects in the Flexible Authorization Framework.
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
2006Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings
Ernesto Damiani, Peng Liu
2006Detection and Resolution of Anomalies in Firewall Policy Rules.
Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham
2006Discretionary and Mandatory Controls for Role-Based Administration.
Jason Crampton
2006Efficient Enforcement of Security Policies Based on Tracking of Mobile Users.
Vijayalakshmi Atluri, Heechang Shin
2006Enhancing User Privacy Through Data Handling Policies.
Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati
2006From Business Process Choreography to Authorization Policies.
Philip Robinson, Florian Kerschbaum, Andreas Schaad
2006Information Theoretical Analysis of Two-Party Secret Computation.
Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu
2006Interactive Analysis of Attack Graphs Using Relational Queries.
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
2006Notarized Federated Identity Management for Web Services.
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
2006On Finding an Inference-Proof Complete Database for Controlled Query Evaluation.
Joachim Biskup, Lena Wiese
2006Policy Classes and Query Rewriting Algorithm for XML Security Views.
Nataliya Rassadko
2006Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
2006Resolving Information Flow Conflicts in RBAC Systems.
Noa Tuval, Ehud Gudes
2006Term Rewriting for Access Control.
Steve Barker, Maribel Fernández
2006XML Streams Watermarking.
Julien Lafaye, David Gross-Amblard