


default search action
17. DBSec 2003: Estes Park, Colorado, USA
- Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray:

Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA. IFIP 142, Kluwer/Springer 2004, ISBN 1-4020-8069-7
Information Warfare
- Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi:

Remote Computer Fingerprinting for Cyber Crime Investigations. 3-15 - Prahalad Ragothaman, Brajendra Panda:

Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases. 16-30
Information Assurance
- Jianyong Zhang, Peng Liu:

Delivering Services with Integrity Guarantees in Survivable Database Systems. 33-46 - Glen Nuckolls, Charles U. Martel, Stuart G. Stubblebine:

Certifying Data from Multiple Sources. 47-60 - Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra:

Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model. 61-74 - Peng Ning, Dingbang Xu:

Adapting Query Optimization Techniques for Efficient Alert Correlation. 75-88
Security and Privacy
- Ehud Gudes, Boris Rozenberg:

Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases. 91-104 - Martin S. Olivier

:
Privacy under Conditions of Concurrent Interaction with Multiple Parties. 105-118 - Csilla Farkas, Andrei Stoica:

Correlated Data Inference. 119-132 - Gultekin Özsoyoglu, David A. Singer, Sun S. Chung:

Anti-Tamper Databases: Querying Encrypted Databases. 133-146
Authorization and Access Control in Distributed Systems
- Joachim Biskup, Thomas Leineweber, Joerg Parthe:

Administration Rights in the SDSD-System. 149-162 - Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi:

Secure Authorisation for Web Services. 163-175 - Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. 176-189 - Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni:

Supporting Delegation in Secure Workflow Management Systems. 190-202
Security Technologies for the Internet
- David W. Chadwick, Edward Ball, M. V. Sahalayev:

Modifying LDAP to Support PKI. 205-214 - Marco Cremonini, Ernesto Damiani

, Pierangela Samarati:
Semantics-Aware Perimeter Protection. 229-242 - Paul D. Ezhilchelvan, Santosh K. Shrivastava:

Systematic Development of a Family of Fair Exchange Protocols. 243-258
Access Control Models and Technologies
- Jong P. Yoon:

High-speed Access Control for XML Documents. 261-274 - Tsau Young Lin:

Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses. 275-287 - Steve Barker, Paul Douglas:

RBAC Policy Implementation for SQL Databases. 288-301 - He Wang, Sylvia L. Osborn:

An Administrative Model for Role Graphs. 302-315 - Charles E. Phillips, Steven A. Demurjian, T. C. Ting:

Safety and Liveness for an RBAC/MAC Security Model. 316-329 - Xinwen Zhang, Jaehong Park, Ravi S. Sandhu:

Schema Based XML Security: RBAC Approach. 330-343 - Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody:

Persistent versus Dynamic Role Membership. 344-357 - Shiping Chen, Duminda Wijesekera, Sushil Jajodia:

FlexFlow: A Flexible Flow Control Policy Specification Framework. 358-371
Key Note
- Bhavani Thuraisingham:

Data and Applications Security: Past, Present and the Future. 375-390
Panel
- Mark Pollitt, Michael A. Caloyannides, Jon Novotny, Sujeet Shenoi:

Digital Forensics: Operational, Legal, and Research Issues. 393-403

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














