default search action
16. DBSec 2002: Cambridge, UK
- Ehud Gudes, Sujeet Shenoi:
Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK. IFIP Conference Proceedings 256, Kluwer 2003, ISBN 1-4020-7541-3
Role-Based Access Control
- András Belokosztolszki, David M. Eyers:
Shielding RBAC Infrastructures from Cyberterrorism. DBSec 2002: 3-14 - Cecilia Ionita, Sylvia L. Osborn:
Privilege Administration for the Role Graph Model. DBSec 2002: 15-25 - Steve Barker, Paul Douglas, Terry Fanning:
Implementing RBAC Policies. DBSec 2002: 27-36 - M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting:
Role Delegation for a Resource-Based Security Model. DBSec 2002: 37-48 - Dongwan Shin, Gail-Joon Ahn, Sangrae Cho:
Using X.509 Attribute Certificates for Role-Based EAM. DBSec 2002: 49-60 - Lucas C. J. Dreyer, Martin S. Olivier:
Implementing Workflow Systems. DBSec 2002: 61-72
Database Security
- Peng Liu, Ying Wang:
Multiphase Damage Confinement System for Databases. DBSec 2002: 75-87 - Prahalad Ragothaman, Brajendra Panda:
Analyzing Transaction Logs for Effective Damage Assessment. DBSec 2002: 89-101 - Steve Barker:
Deductive Database Security. DBSec 2002: 103-114
XML Security
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Towards Secure XML Federations. DBSec 2002: 117-131 - Andrei Stoica, Csilla Farkas:
Secure XML Views. DBSec 2002: 133-146 - Elisa Bertino, Elena Ferrari, Giovanni Mella:
Distributed Cooperative Updates of XML Documents. DBSec 2002: 147-159
Data Mining and Inference
- Tom Johnsten, Vijay V. Raghavan, Kevin Hill:
On Security and Privacy Risks in Association Mining Algorithms. DBSec 2002: 163-174 - Daniel Barbará, Rajni Goel, Sushil Jajodia:
Mining Malicious Corruption of Data with Hidden Markov Models. DBSec 2002: 175-189 - Liwu Chang, Ira S. Moskowitz:
A Study of Inference Problems in Distributed Databases. DBSec 2002: 191-204
Multimedia System Security
- Vijayalakshmi Atluri, Pietro Mazzoleni:
Uniform Indexing for Geospatial Data and Authorizations. DBSec 2002: 207-218 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati:
Access Control of SVG Documents. DBSec 2002: 219-230
Network Security
- Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa:
On Modeling Computer Networks for Vulnerability Analysis. DBSec 2002: 233-244 - James C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich:
On-line Intrusion Protection by Detecting Attacks with Diversity. DBSec 2002: 245-256
Public Key Infrastructure
- Ravi Mukkamala, Satyam Das, Mahantesh Halappanavar:
Recertification: A Technique to Improve Services in PKI. DBSec 2002: 259-270 - Joachim Biskup, Yücel Karabulut:
A Hybrid PKI Model: Application to Secure Mediation. DBSec 2002: 271-282
Formal Methods and Protocols
- Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale:
Implementation and Verification of Programmable Security. DBSec 2002: 285-299 - Peter Ryan, Ragni Ryvold Arnesen:
A Process Algebraic Approach to Security Policies. DBSec 2002: 301-312 - Indrajit Ray, Indrakshi Ray:
Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327
Security and Privacy
- David W. Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani Thuraisingham:
Privacy and Civil Liberties. DBSec 2002: 331-346
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.