


default search action
19. DBSec 2005: Storrs, CT, USA
- Sushil Jajodia, Duminda Wijesekera:

Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3654, Springer 2005, ISBN 3-540-28138-X - Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck, Divesh Srivastava:

Streams, Security and Scalability. 1-15 - Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:

Towards Privacy-Enhanced Authorization Policies and Languages. 16-27 - Andreas Schaad:

Revocation of Obligation and Authorisation Policy Objects. 28-39 - Jaime A. Pavlich-Mariscal

, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting:
Role Slices: A Notation for RBAC Permission Assignment and Enforcement. 40-53 - Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes:

Designing Secure Indexes for Encrypted Databases. 54-68 - Jun Li, Edward Omiecinski:

Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. 69-83 - Glen Nuckolls:

Verified Query Results from Hybrid Authentication Trees. 84-98 - Inja Youn, Csilla Farkas, Bhavani Thuraisingham:

Multilevel Secure Teleconferencing over Public Switched Telephone Network. 99-113 - Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu:

Secrecy of Two-Party Secure Computation. 114-123 - Tai Xin, Yajie Zhu, Indrakshi Ray:

Reliable Scheduling of Advanced Transactions. 124-138 - Jaideep Vaidya, Chris Clifton:

Privacy-Preserving Decision Trees over Vertically Partitioned Data. 139-152 - Justin Zhijun Zhan, Stan Matwin, LiWu Chang:

Privacy-Preserving Collaborative Association Rule Mining. 153-165 - Wei Jiang, Chris Clifton:

Privacy-Preserving Distributed k-Anonymity. 166-177 - Kun Bai, Alex Hai Wang, Peng Liu:

Towards Database Firewalls. 178-192 - Alex X. Liu, Mohamed G. Gouda:

Complete Redundancy Detection in Firewalls. 193-206 - Adrian Spalka, Jan Lehnhardt:

A Comprehensive Approach to Anomaly Detection in Relational Databases. 207-221 - Sarath Indrakanti, Vijay Varadharajan:

An Authorization Architecture for Web Services. 222-236 - Guang-Lei Song, Kang Zhang, Bhavani Thuraisingham, Jun Kong:

Secure Model Management Operations for the Web. 237-251 - Janice Warner, Vijayalakshmi Atluri

, Ravi Mukkamala:
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. 252-266 - Joachim Biskup, Barbara Sprick, Lena Wiese

:
Secure Mediation with Mobile Code. 267-280 - Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray:

Security Vulnerabilities in Software Systems: A Quantitative Perspective. 281-294 - Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert:

Trading Off Security in a Service Oriented Architecture. 295-309 - Joon S. Park, Harish S. Krishnan:

Trusted Identity and Session Management Using Secure Cookies. 310-324 - Murat Kantarcioglu, Chris Clifton:

Security Issues in Querying Encrypted Data. 325-337 - Amihai Motro, Francesco Parisi-Presicce:

Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. 338-352

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














