Advertisement

Data and Applications Security XVII

Status and Prospects

  • Sabrina De Capitani di Vimercati
  • Indrakshi Ray
  • Indrajit Ray

Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 142)

Table of contents

  1. Front Matter
    Pages i-xxiii
  2. Information Warfare

    1. Front Matter
      Pages 1-1
    2. Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi
      Pages 3-15
  3. Information Assurance

    1. Front Matter
      Pages 31-31
    2. Glen Nuckolls, Chip Martel, Stuart G. Stubblebine
      Pages 47-60
    3. Hakan Hacigümüş, Bala Iyer, Sharad Mehrotra
      Pages 61-74
  4. Security and Privacy

    1. Front Matter
      Pages 89-89
    2. Csilla Farkas, Andrei G. Stoica
      Pages 119-132
    3. Gultekin Ozsoyoglu, David A. Singer, Sun S. Chung
      Pages 133-146
  5. Authorization and Access Control in Distributed Systems

    1. Front Matter
      Pages 147-147
    2. Joachim Biskup, Thomas Leineweber, Jörg Parthe
      Pages 149-162
    3. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar
      Pages 163-175
    4. E. Ferrari, A. C. Squicciarini, E. Bertino
      Pages 176-189
    5. Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni
      Pages 190-202
  6. Security Technologies for the Internet

    1. Front Matter
      Pages 203-203
    2. D. W. Chadwick, E. Ball, M. V. Sahalayev
      Pages 205-214
    3. Marco Cremonini, Ernesto Damiani, Pierangela Samarati
      Pages 229-242
    4. Paul D. Ezhilchelvan, Santosh K. Shrivastava
      Pages 243-258
  7. Access Control Models and Technologies

    1. Front Matter
      Pages 259-259
    2. Jong P. Yoon
      Pages 261-274
    3. Tsau Young T. Y. Lin
      Pages 275-287
    4. Steve Barker, Paul Douglas
      Pages 288-301
    5. He Wang, Sylvia L. Osborn
      Pages 302-315
    6. C. Phillips, S. Demurjian, T. C. Ting
      Pages 316-329
    7. Xinwen Zhang, Jaehong Park, Ravi Sandhu
      Pages 330-343
    8. Jean Bacon, Ken Moody, David Chadwick, Oleksandr Otenko
      Pages 344-357
    9. Shiping Chen, Duminda Wijesekera, Sushil Jajodia
      Pages 358-371
  8. Key Note

    1. Front Matter
      Pages 373-373
  9. Panel

    1. Front Matter
      Pages 391-391
    2. M. Pollitt, M. Caloyannides, J. Novotny, S. Shenoi
      Pages 393-403

About this book

Introduction

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats.

Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include:
-Information Warfare,
-Information Assurance,
-Security and Privacy,
-Authorization and Access Control in Distributed Systems,
-Security Technologies for the Internet,
-Access Control Models and Technologies,
-Digital Forensics.

This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security.

Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.

Keywords

Access Extensible Markup Language (XML) Fingerprinting Internet Protection access control communication database database systems distributed systems information network optimization privacy semantics

Editors and affiliations

  • Sabrina De Capitani di Vimercati
    • 1
  • Indrakshi Ray
    • 2
  • Indrajit Ray
    • 2
  1. 1.Università degli Studi di MilanoItaly
  2. 2.Colorado State UniversityUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b116220
  • Copyright Information Springer Science + Business Media, Inc. 2004
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4020-8069-2
  • Online ISBN 978-1-4020-8070-8
  • Series Print ISSN 1571-5736
  • Buy this book on publisher's site
Industry Sectors
Pharma
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace