


default search action
20. DBSec 2006: Sophia Antipolis, France
- Ernesto Damiani, Peng Liu:

Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings. Lecture Notes in Computer Science 4127, Springer 2006, ISBN 3-540-36796-9 - Nicola Zannone

, Sushil Jajodia, Duminda Wijesekera:
Creating Objects in the Flexible Authorization Framework. 1-14 - Muhammad Abedin, Syeda Nessa, Latifur Khan

, Bhavani Thuraisingham:
Detection and Resolution of Anomalies in Firewall Policy Rules. 15-29 - Joachim Biskup, Lena Wiese

:
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. 30-43 - Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz:

Consolidating the Access Control of Composite Applications and Workflows. 44-59 - Weiwei Cheng, HweeHwa Pang

, Kian-Lee Tan
:
Authenticating Multi-dimensional Query Results in Data Publishing. 60-73 - Julien Lafaye, David Gross-Amblard:

XML Streams Watermarking. 74-88 - Einar Mykletun, Gene Tsudik:

Aggregation Queries in the Database-As-a-Service Model. 89-103 - Nataliya Rassadko:

Policy Classes and Query Rewriting Algorithm for XML Security Views. 104-118 - Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:

Interactive Analysis of Attack Graphs Using Relational Queries. 119-132 - Michael T. Goodrich, Roberto Tamassia, Danfeng Yao

:
Notarized Federated Identity Management for Web Services. 133-147 - Noa Tuval, Ehud Gudes:

Resolving Information Flow Conflicts in RBAC Systems. 148-162 - Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann:

Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. 163-178 - Steve Barker, Maribel Fernández:

Term Rewriting for Access Control. 179-193 - Jason Crampton:

Discretionary and Mandatory Controls for Role-Based Administration. 194-208 - Ravi Mukkamala, Vijayalakshmi Atluri

, Janice Warner, Ranjit Abbadasari:
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. 209-223 - Claudio A. Ardagna

, Sabrina De Capitani di Vimercati
, Pierangela Samarati
:
Enhancing User Privacy Through Data Handling Policies. 224-236 - Vijayalakshmi Atluri

, Heechang Shin:
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. 237-251 - Indrajit Ray, Sudip Chakraborty

:
A Framework for Flexible Access Control in Digital Library Systems. 252-266 - Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe

:
Authrule: A Generic Rule-Based Authorization Module. 267-281 - Geri Georg, Siv Hilde Houmb, Indrakshi Ray:

Aspect-Oriented Risk Driven Development of Secure Applications. 282-296 - Philip Robinson, Florian Kerschbaum, Andreas Schaad:

From Business Process Choreography to Authorization Policies. 297-309 - Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu:

Information Theoretical Analysis of Two-Party Secret Computation. 310-317

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














