Advertisement

© 2003

Research Directions in Data and Applications Security

IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

  • Ehud Gudes
  • Sujeet Shenoi
Book

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 128)

Table of contents

  1. Front Matter
    Pages i-xix
  2. Role-Based Access Control

    1. Front Matter
      Pages 1-1
    2. András Belokosztolszki, David Eyers
      Pages 3-14
    3. Cecilia Ionita, Sylvia Osborn
      Pages 15-25
    4. Steve Barker, Paul Douglas, Terry Fanning
      Pages 27-36
    5. M. Liebrand, H. Ellis, C. Phillips, S. Demurjian, T. C. Ting, J. Ellis
      Pages 37-48
    6. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho
      Pages 49-60
    7. Lucas Dreyer, Martin Olivier
      Pages 61-72
  3. Database Security

    1. Front Matter
      Pages 73-73
    2. Peng Liu, Ying Wang
      Pages 75-87
    3. Prahalad Ragothaman, Brajendra Panda
      Pages 89-101
    4. Steve Barker
      Pages 103-114
  4. XML Security

    1. Front Matter
      Pages 115-115
    2. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
      Pages 117-131
    3. Andrei Stoica, Csilla Farkas
      Pages 133-146
    4. Elisa Bertino, Elena Ferrari, Giovanni Mella
      Pages 147-159
  5. Data Mining and Inference

    1. Front Matter
      Pages 161-161
    2. Tom Johnsten, Vijay Raghavan, Kevin Hill
      Pages 163-174
    3. Daniel Barbará, Rajni Goel, Sushil Jajodia
      Pages 175-189
    4. LiWu Chang, Ira Moskowitz
      Pages 191-204

About this book

Introduction

Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include:

-Role-Based Access Control;
-Database Security;
-XML Security;
-Data Mining and Inference;
-Multimedia System Security;
-Network Security;
-Public Key Infrastructure;
-Formal Methods and Protocols;
-Security and Privacy.

Keywords

Access Bridge Extensible Markup Language (XML) access control algorithms communication data mining database database systems formal method information multimedia network network security privacy

Editors and affiliations

  • Ehud Gudes
    • 1
  • Sujeet Shenoi
    • 2
  1. 1.Ben-Gurion University of the NegevIsrael
  2. 2.University of TulsaUSA

Bibliographic information

  • Book Title Research Directions in Data and Applications Security
  • Book Subtitle IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK
  • Editors Ehud Gudes
    Sujeet Shenoi
  • Series Title IFIP — The International Federation for Information Processing
  • DOI https://doi.org/10.1007/978-0-387-35697-6
  • Copyright Information IFIP International Federation for Information Processing 2003
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Hardcover ISBN 978-1-4020-7541-4
  • Softcover ISBN 978-1-4757-6413-0
  • eBook ISBN 978-0-387-35697-6
  • Series ISSN 1868-4238
  • Series E-ISSN 1868-422X
  • Edition Number 1
  • Number of Pages XXII, 350
  • Number of Illustrations 0 b/w illustrations, 0 illustrations in colour
  • Topics Theory of Computation
    Data Structures and Information Theory
    Computer Communication Networks
    Information Storage and Retrieval
  • Buy this book on publisher's site
Industry Sectors
Automotive
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering
Finance, Business & Banking
Electronics