


default search action
23. DBSec 2009: Montreal, Canada
- Ehud Gudes, Jaideep Vaidya:

Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings. Lecture Notes in Computer Science 5645, Springer 2009, ISBN 978-3-642-03006-2
Database Security I
- Joachim Biskup, Jens Seiler, Torben Weibert:

Controlled Query Evaluation and Inference-Free View Updates. 1-16 - Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett:

Implementing Reflective Access Control in SQL. 17-32
Security Policies
- Simon N. Foley

, William M. Fitzgerald:
An Approach to Security Policy Configuration Using Semantic Threat Graphs. 33-48 - Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:

Reaction Policy Model Based on Dynamic Organizations and Threat Context. 49-64 - Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn

:
Towards System Integrity Protection with Graph-Based Policy Analysis. 65-80
Privacy I
- Keith B. Frikken:

Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. 81-94 - Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sandikkaya

, Bart De Decker, Hans Vangheluwe
:
Privacy-Preserving Telemonitoring for eHealth. 95-110
Intrusion Detection and Protocols
- Yermek Nugmanov, Brajendra Panda, Yi Hu:

Analysis of Data Dependency Based Intrusion Detection System. 111-125 - Xiaofeng Yang, Mohammad Zulkernine:

Secure Method Calls by Instrumenting Bytecode with Aspects. 126-141
Access Control
- Christoph Sturm, Ela Hunt

, Marc H. Scholl
:
Distributed Privilege Enforcement in PACS. 142-158 - Heechang Shin, Vijayalakshmi Atluri

:
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. 159-174 - Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi

:
Using Edit Automata for Rewriting-Based Security Enforcement. 175-190
Privacy II
- Pawel Jurczyk, Li Xiong

:
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers. 191-207 - Bechara al Bouna, Richard Chbeir:

Detecting Inference Channels in Private Multimedia Data via Social Networks. 208-224
Database Security II
- Valentina Ciriani

, Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
:
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. 225-239 - Wolter Pieters, Qiang Tang:

Data Is Key: Introducing the Data-Based Access Control Paradigm. 240-251
Trusted Computing
- Stephen R. Tate, Roopa Vishwanathan:

Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology. 252-267 - Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu

:
PAES: Policy-Based Authority Evaluation Scheme. 268-282
Short Papers
- Solomon Berhe, Steven A. Demurjian, Thomas Agresta:

Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. 283-290 - Ehud Gudes, Nurit Gal-Oz, Alon Grubshtein:

Methods for Computing Trust and Reputation While Preserving Privacy. 291-298 - Olivier Sarrouy, Eric Totel, Bernard Jouga:

Building an Application Data Behavior Model for Intrusion Detection. 299-306 - Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray:

A Trust-Based Access Control Model for Pervasive Computing Applications. 307-314

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














