default search action
22. DBSec 2008: London, UK
- Vijay Atluri:
Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings. Lecture Notes in Computer Science 5094, Springer 2008, ISBN 978-3-540-70566-6
Access Control
- Steve Barker:
Dynamic Meta-level Access Control in SQL. 1-16 - Manachai Toahchoodee, Indrakshi Ray:
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. 17-32
Audit and Logging
- Vikram Goyal, Shyam K. Gupta, Anand Gupta:
A Unified Audit Expression Model for Auditing SQL Queries. 33-47 - Di Ma, Gene Tsudik:
A New Approach to Secure Logging. 48-63
Keynote
- Ross J. Anderson:
Security, Functionality and Scale? 64
Privacy I
- Angela Cristina Duta, Ken Barker:
P4A: A New Privacy Model for XML. 65-80 - Barbara Carminati, Elena Ferrari:
Privacy-Aware Collaborative Access Control in Web-Based Social Networks. 81-96 - Kristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe:
A Privacy-Preserving Ticketing System. 97-112
Systems Security
- Mohamed Abo El-Fotouh, Klaus Diepold:
The Analysis of Windows Vista Disk Encryption Algorithm. 113-126 - Changyu Dong, Giovanni Russello, Naranker Dulay:
Shared and Searchable Encrypted Data for Untrusted Servers. 127-143 - Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam:
Secure Construction of Contingency Tables from Distributed Data. 144-157
Invited Talk
- Anoop Singhal:
Web Services Security: Techniques and Challenges (Extended Abstract). 158
Certificate Management
- Daryl Walleck, Yingjiu Li, Shouhuai Xu:
Empirical Analysis of Certificate Revocation Lists. 159-174 - Candelaria Hernández-Goya, Pino Caballero-Gil, Oscar Delgado-Mohatar, Jezabel Molina-Gil, Cándido Caballero-Gil:
Using New Tools for Certificate Repositories Generation in MANETs. 175-189
Privacy II
- Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky:
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. 190-204 - Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang:
Protecting the Publishing Identity in Multiple Tuples. 205-218
Panel
- Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?. 219-221
Trusted Computing Platforms
- Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora:
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. 222-237 - Muntaha Alawneh, Imad M. Abbadi:
Sharing but Protecting Content Against Internal Leakage for Organisations. 238-253
Security Policies and Metrics
- Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati:
Regulating Exceptions in Healthcare Using Policy Spaces. 254-267 - Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad Debbabi:
Towards Automation of Testing High-Level Security Properties. 268-282 - Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia:
An Attack Graph-Based Probabilistic Security Metric. 283-296
Web and Pervasive Systems
- Indrajit Ray, Nayot Poolsappasit, Rinku Dewri:
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. 297-312 - Alex Roichman, Ehud Gudes:
DIWeDa - Detecting Intrusions in Web Databases. 313-329 - Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera:
Securing Workflows with XACML, RDF and BPEL. 330-345
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.