skip to content
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings Preview this item
ClosePreview this item
Checking...

Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings

Author: Ehud Gudes; Jaideep Vaidya
Publisher: Berlin : Springer, ©2009.
Series: Lecture notes in computer science, 5645.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009. The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Print version:
IFIP WG 11.3 Working Conference on Data and Applications Security (23rd : 2009 : Montréal, Québec).
Data and applications security XXIII.
Berlin : Springer, ©2009
(OCoLC)427321495
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Ehud Gudes; Jaideep Vaidya
ISBN: 9783642030079 3642030076 3642030068 9783642030062
OCLC Number: 437345745
Notes: International conference proceedings.
Copyright by IFIP International Federation for Information Processing.
Description: 1 online resource (xi, 314 pages) : illustrations.
Contents: Database Security I --
Controlled Query Evaluation and Inference-Free View Updates --
Implementing Reflective Access Control in SQL --
Security Policies --
An Approach to Security Policy Configuration Using Semantic Threat Graphs --
Reaction Policy Model Based on Dynamic Organizations and Threat Context --
Towards System Integrity Protection with Graph-Based Policy Analysis --
Privacy I --
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation --
Privacy-Preserving Telemonitoring for eHealth --
Intrusion Detection and Protocols --
Analysis of Data Dependency Based Intrusion Detection System --
Secure Method Calls by Instrumenting Bytecode with Aspects --
Access Control --
Distributed Privilege Enforcement in PACS --
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates --
Using Edit Automata for Rewriting-Based Security Enforcement --
Privacy II --
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers --
Detecting Inference Channels in Private Multimedia Data via Social Networks --
Database Security II --
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients --
Data Is Key: Introducing the Data-Based Access Control Paradigm --
Trusted Computing --
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology --
PAES: Policy-Based Authority Evaluation Scheme --
Short Papers --
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC --
Methods for Computing Trust and Reputation While Preserving Privacy --
Building an Application Data Behavior Model for Intrusion Detection --
A Trust-Based Access Control Model for Pervasive Computing Applications.
Series Title: Lecture notes in computer science, 5645.
Responsibility: Ehud Gudes, Jaideep Vaidya (eds.).

Abstract:

This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009. The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/437345745> # Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
   library:oclcnum "437345745" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/864040431#Place/berlin> ; # Berlin
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/systemplattform> ; # Systemplattform
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/datensicherung> ; # Datensicherung
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/abfrage> ; # Abfrage
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/datenbanksystem> ; # Datenbanksystem
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/rechnernetz> ; # Rechnernetz
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/trusted_computing> ; # Trusted Computing
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/privatsphare> ; # Privatsphäre
   schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/zugriffskontrolle> ; # Zugriffskontrolle
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/anwendungssystem> ; # Anwendungssystem
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/informatique> ; # Informatique
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/database_security> ; # Database security
   schema:about <http://id.worldcat.org/fast/888063> ; # Database security
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/kryptoanalyse> ; # Kryptoanalyse
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/computers_access_control> ; # Computers--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/864040431#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/22438184> ; # Jaideep Vaidya
   schema:contributor <http://viaf.org/viaf/90893532> ; # Ehud Gudes
   schema:copyrightYear "2009" ;
   schema:creator <http://experiment.worldcat.org/entity/work/data/864040431#Meeting/annual_ifip_wg_11_3_working_conference_on_data_and_applications_security_23rd_2009_montreal_quebec> ; # Annual IFIP WG 11.3 Working Conference on Data and Applications Security (23rd : 2009 : Montreal, Quebec)
   schema:datePublished "2009" ;
   schema:description "Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications."@en ;
   schema:description "This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009. The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/864040431> ;
   schema:genre "Electronic books"@en ;
   schema:genre "Conference papers and proceedings"@en ;
   schema:genre "Conference publication"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/864040431#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
   schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science,
   schema:isSimilarTo <http://www.worldcat.org/oclc/427321495> ;
   schema:name "Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings"@en ;
   schema:productID "437345745" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/437345745#PublicationEvent/berlin_springer_2009> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/864040431#Agent/springer> ; # Springer
   schema:url <http://site.ebrary.com/id/10317569> ;
   schema:url <http://www.myilibrary.com?id=229798> ;
   schema:url <http://link.springer.com/10.1007/978-3-642-03007-9> ;
   schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-642-03006-2> ;
   schema:url <http://springerlink.com/openurl.asp?genre=book&isbn=978-3-642-03006-2> ;
   schema:url <http://dx.doi.org/10.1007/978-3-642-03007-9> ;
   schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-642-03006-2> ;
   schema:workExample <http://dx.doi.org/10.1007/978-3-642-03007-9> ;
   schema:workExample <http://worldcat.org/isbn/9783642030062> ;
   schema:workExample <http://worldcat.org/isbn/9783642030079> ;
   umbel:isLike <http://d-nb.info/994680392> ;
   umbel:isLike <http://d-nb.info/1000458938> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/437345745> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/864040431#Meeting/annual_ifip_wg_11_3_working_conference_on_data_and_applications_security_23rd_2009_montreal_quebec> # Annual IFIP WG 11.3 Working Conference on Data and Applications Security (23rd : 2009 : Montreal, Quebec)
    a bgn:Meeting, schema:Event ;
   schema:location <http://experiment.worldcat.org/entity/work/data/864040431#Place/montreal_quebec> ; # Montreal, Quebec)
   schema:name "Annual IFIP WG 11.3 Working Conference on Data and Applications Security (23rd : 2009 : Montreal, Quebec)" ;
    .

<http://experiment.worldcat.org/entity/work/data/864040431#Place/montreal_quebec> # Montreal, Quebec)
    a schema:Place ;
   schema:name "Montreal, Quebec)" ;
    .

<http://experiment.worldcat.org/entity/work/data/864040431#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/437345745> ; # Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
   schema:name "Lecture notes in computer science ;" ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control"@en ;
    .

<http://id.worldcat.org/fast/888063> # Database security
    a schema:Intangible ;
   schema:name "Database security"@en ;
    .

<http://viaf.org/viaf/22438184> # Jaideep Vaidya
    a schema:Person ;
   schema:familyName "Vaidya" ;
   schema:givenName "Jaideep" ;
   schema:name "Jaideep Vaidya" ;
    .

<http://viaf.org/viaf/90893532> # Ehud Gudes
    a schema:Person ;
   schema:familyName "Gudes" ;
   schema:givenName "Ehud" ;
   schema:name "Ehud Gudes" ;
    .

<http://worldcat.org/isbn/9783642030062>
    a schema:ProductModel ;
   schema:isbn "3642030068" ;
   schema:isbn "9783642030062" ;
    .

<http://worldcat.org/isbn/9783642030079>
    a schema:ProductModel ;
   schema:isbn "3642030076" ;
   schema:isbn "9783642030079" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science,
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/437345745> ; # Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
   schema:issn "0302-9743" ;
   schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/oclc/427321495>
    a schema:CreativeWork ;
   rdfs:label "Data and applications security XXIII." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/437345745> ; # Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
    .

<http://www.worldcat.org/title/-/oclc/437345745>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/437345745> ; # Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings
   schema:dateModified "2017-12-25" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.