


default search action
16. DBSec 2002: Cambridge, UK
- Ehud Gudes, Sujeet Shenoi:

Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK. IFIP Conference Proceedings 256, Kluwer 2003, ISBN 1-4020-7541-3
Role-Based Access Control
- András Belokosztolszki, David M. Eyers:

Shielding RBAC Infrastructures from Cyberterrorism. DBSec 2002: 3-14 - Cecilia Ionita, Sylvia L. Osborn:

Privilege Administration for the Role Graph Model. DBSec 2002: 15-25 - Steve Barker, Paul Douglas, Terry Fanning:

Implementing RBAC Policies. DBSec 2002: 27-36 - M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting:

Role Delegation for a Resource-Based Security Model. DBSec 2002: 37-48 - Dongwan Shin, Gail-Joon Ahn, Sangrae Cho:

Using X.509 Attribute Certificates for Role-Based EAM. DBSec 2002: 49-60 - Lucas C. J. Dreyer, Martin S. Olivier:

Implementing Workflow Systems. DBSec 2002: 61-72
Database Security
- Peng Liu, Ying Wang:

Multiphase Damage Confinement System for Databases. DBSec 2002: 75-87 - Prahalad Ragothaman, Brajendra Panda:

Analyzing Transaction Logs for Effective Damage Assessment. DBSec 2002: 89-101 - Steve Barker:

Deductive Database Security. DBSec 2002: 103-114
XML Security
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:

Towards Secure XML Federations. DBSec 2002: 117-131 - Andrei Stoica, Csilla Farkas:

Secure XML Views. DBSec 2002: 133-146 - Elisa Bertino, Elena Ferrari, Giovanni Mella:

Distributed Cooperative Updates of XML Documents. DBSec 2002: 147-159
Data Mining and Inference
- Tom Johnsten, Vijay V. Raghavan, Kevin Hill:

On Security and Privacy Risks in Association Mining Algorithms. DBSec 2002: 163-174 - Daniel Barbará, Rajni Goel, Sushil Jajodia:

Mining Malicious Corruption of Data with Hidden Markov Models. DBSec 2002: 175-189 - Liwu Chang, Ira S. Moskowitz:

A Study of Inference Problems in Distributed Databases. DBSec 2002: 191-204
Multimedia System Security
- Vijayalakshmi Atluri, Pietro Mazzoleni:

Uniform Indexing for Geospatial Data and Authorizations. DBSec 2002: 207-218 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati:

Access Control of SVG Documents. DBSec 2002: 219-230
Network Security
- Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa:

On Modeling Computer Networks for Vulnerability Analysis. DBSec 2002: 233-244 - James C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich:

On-line Intrusion Protection by Detecting Attacks with Diversity. DBSec 2002: 245-256
Public Key Infrastructure
- Ravi Mukkamala, Satyam Das, Mahantesh Halappanavar:

Recertification: A Technique to Improve Services in PKI. DBSec 2002: 259-270 - Joachim Biskup, Yücel Karabulut:

A Hybrid PKI Model: Application to Secure Mediation. DBSec 2002: 271-282
Formal Methods and Protocols
- Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale:

Implementation and Verification of Programmable Security. DBSec 2002: 285-299 - Peter Ryan, Ragni Ryvold Arnesen:

A Process Algebraic Approach to Security Policies. DBSec 2002: 301-312 - Indrajit Ray, Indrakshi Ray:

Anonymous and Secure Multicast Subscription. DBSec 2002: 313-327
Security and Privacy
- David W. Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani Thuraisingham:

Privacy and Civil Liberties. DBSec 2002: 331-346

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














