Research Directions in Data and Applications Security

IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

  • Ehud Gudes
  • Sujeet Shenoi

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 128)

Table of contents

  1. Front Matter
    Pages i-xix
  2. Role-Based Access Control

    1. Front Matter
      Pages 1-1
    2. András Belokosztolszki, David Eyers
      Pages 3-14
    3. Cecilia Ionita, Sylvia Osborn
      Pages 15-25
    4. Steve Barker, Paul Douglas, Terry Fanning
      Pages 27-36
    5. M. Liebrand, H. Ellis, C. Phillips, S. Demurjian, T. C. Ting, J. Ellis
      Pages 37-48
    6. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho
      Pages 49-60
    7. Lucas Dreyer, Martin Olivier
      Pages 61-72
  3. Database Security

    1. Front Matter
      Pages 73-73
    2. Peng Liu, Ying Wang
      Pages 75-87
    3. Prahalad Ragothaman, Brajendra Panda
      Pages 89-101
    4. Steve Barker
      Pages 103-114
  4. XML Security

    1. Front Matter
      Pages 115-115
    2. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
      Pages 117-131
    3. Andrei Stoica, Csilla Farkas
      Pages 133-146
    4. Elisa Bertino, Elena Ferrari, Giovanni Mella
      Pages 147-159
  5. Data Mining and Inference

    1. Front Matter
      Pages 161-161
    2. Tom Johnsten, Vijay Raghavan, Kevin Hill
      Pages 163-174
    3. Daniel Barbará, Rajni Goel, Sushil Jajodia
      Pages 175-189
    4. LiWu Chang, Ira Moskowitz
      Pages 191-204
  6. Multimedia System Security

    1. Front Matter
      Pages 205-205
    2. Vijayalakshmi Atluri, Pietro Mazzoleni
      Pages 207-218
    3. E. Damiani, S. De Capitani di Vimercati, E. Fernández-Medina, P. Samarati
      Pages 219-230
  7. Network Security

    1. Front Matter
      Pages 231-231
    2. C. Campbell, J. Dawkins, B. Pollet, K. Fitch, J. Hale, M. Papa
      Pages 233-244
    3. J. Reynolds, J. Just, E. Lawson, L. Clough, R. Maglich
      Pages 245-256
  8. Public Key Infrastructure

    1. Front Matter
      Pages 257-257
    2. Ravi Mukkamala, Satyam Das, Mahantesh Halappanavar
      Pages 259-270
    3. Joachim Biskup, Yücel Karabulut
      Pages 271-282
  9. Formal Methods and Protocols

    1. Front Matter
      Pages 283-283
    2. Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale
      Pages 285-299
    3. Peter Ryan, Ragni Ryvold Arnesen
      Pages 301-312
    4. Indrajit Ray, Indrakshi Ray
      Pages 313-327
  10. Security and Privacy

    1. Front Matter
      Pages 329-329
    2. D. Chadwick, M. Olivier, P. Samarati, E. Sharpston, B. Thuraisingham
      Pages 331-346

About this book


Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include:

-Role-Based Access Control;
-Database Security;
-XML Security;
-Data Mining and Inference;
-Multimedia System Security;
-Network Security;
-Public Key Infrastructure;
-Formal Methods and Protocols;
-Security and Privacy.


Access Bridge Extensible Markup Language (XML) access control algorithms communication data mining database database systems formal method information multimedia network network security privacy

Editors and affiliations

  • Ehud Gudes
    • 1
  • Sujeet Shenoi
    • 2
  1. 1.Ben-Gurion University of the NegevIsrael
  2. 2.University of TulsaUSA

Bibliographic information

  • DOI
  • Copyright Information IFIP International Federation for Information Processing 2003
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4757-6413-0
  • Online ISBN 978-0-387-35697-6
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site
Industry Sectors
IT & Software