000 04085nam a22006495i 4500
001 978-3-540-31937-5
003 DE-He213
005 20240730194110.0
007 cr nn 008mamaa
008 100726s2005 gw | s |||| 0|eng d
020 _a9783540319375
_9978-3-540-31937-5
024 7 _a10.1007/11535706
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aData and Applications Security XIX
_h[electronic resource] :
_b19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings /
_cedited by Sushil Jajodia, Duminda Wijesekera.
250 _a1st ed. 2005.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2005.
300 _aX, 353 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v3654
505 0 _aStreams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Results from Hybrid Authentication Trees -- Multilevel Secure Teleconferencing over Public Switched Telephone Network -- Secrecy of Two-Party Secure Computation -- Reliable Scheduling of Advanced Transactions -- Privacy-Preserving Decision Trees over Vertically Partitioned Data -- Privacy-Preserving Collaborative Association Rule Mining -- Privacy-Preserving Distributed k-Anonymity -- Towards Database Firewalls -- Complete Redundancy Detection in Firewalls -- A Comprehensive Approach to Anomaly Detection in Relational Databases -- An Authorization Architecture for Web Services -- Secure Model Management Operations for the Web -- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions -- Secure Mediation with Mobile Code -- Security Vulnerabilities in Software Systems: A Quantitative Perspective -- Trading Off Security in a Service Oriented Architecture -- Trusted Identity and Session Management Using Secure Cookies -- Security Issues in Querying Encrypted Data -- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aComputers, Special purpose.
_946653
650 0 _aOperating systems (Computers).
_95329
650 0 _aAlgorithms.
_93390
650 0 _aElectronic data processing
_xManagement.
_9155720
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9155721
650 2 4 _aSpecial Purpose and Application-Based Systems.
_946654
650 2 4 _aOperating Systems.
_937074
650 2 4 _aAlgorithms.
_93390
650 2 4 _aIT Operations.
_931703
700 1 _aJajodia, Sushil.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9155722
700 1 _aWijesekera, Duminda.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9155723
710 2 _aSpringerLink (Online service)
_9155724
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540281382
776 0 8 _iPrinted edition:
_z9783540813866
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v3654
_9155725
856 4 0 _uhttps://doi.org/10.1007/11535706
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c95025
_d95025