


Остановите войну!
for scientists:


default search action
21. DBSec 2007: Redondo Beach, CA, USA
- Steve Barker, Gail-Joon Ahn:
Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings. Lecture Notes in Computer Science 4602, Springer 2007, ISBN 978-3-540-73533-5
Secure Query Evaluation
- Joachim Biskup, Torben Weibert:
Confidentiality Policies for Controlled Query Evaluation. 1-13 - Georgios Amanatidis
, Alexandra Boldyreva, Adam O'Neill:
Provably-Secure Schemes for Basic Query Support in Outsourced Databases. 14-30 - Giuseppe Di Battista, Bernardo Palazzi:
Authenticated Relational Tables and Authenticated Skip Lists. 31-46
Location-Based Security/Mobile Security
- Claudio A. Ardagna
, Marco Cremonini
, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Location Privacy Protection Through Obfuscation-Based Techniques. 47-60 - Vijayalakshmi Atluri
, Heechang Shin:
Efficient Security Policy Enforcement in a Location Based Service Environment. 61-76 - Sudip Chakraborty
, Nayot Poolsappasit, Indrajit Ray:
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. 77-92
Short Papers
- Isabel F. Cruz, Roberto Tamassia, Danfeng Yao
:
Privacy-Preserving Schema Matching Using Mutual Information. 93-94 - Anna Zych, Milan Petkovic, Willem Jonker:
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. 95-97
Distributed Security Issues
- Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring the Overall Security of Network Configurations Using Attack Graphs. 98-112 - Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham:
Enforcing Honesty in Assured Information Sharing Within a Distributed System. 113-128 - Jan Paul Kolter, Rolf Schillinger, Günther Pernul:
A Privacy-Enhanced Attribute-Based Access Control System. 129-143
Cryptographic-Based Security
- Shouhuai Xu, Ravi S. Sandhu:
A Scalable and Secure Cryptographic Service. 144-160 - Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
gVault: A Gmail Based Cryptographic Network File System. 161-176 - Mustafa Canim, Murat Kantarcioglu:
Design and Analysis of Querying Encrypted Data in Relational Databases. 177-194
Temporal Access Control and Usage Control
- Clara Bertolissi, Maribel Fernández, Steve Barker:
Dynamic Event-Based Access Control as Term Rewriting. 195-210 - Indrakshi Ray, Manachai Toahchoodee:
A Spatio-temporal Role-Based Access Control Model. 211-226 - Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin:
Towards a Times-Based Usage Control Model. 227-242
System Security Issues
- Yanjiang Yang, Yingjiu Li, Robert H. Deng
:
New Paradigm of Inference Control with Trusted Computing. 243-258 - Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie
:
Security Patterns for Physical Access Control Systems. 259-274 - Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera:
XACML Policies for Exclusive Resource Usage. 275-290

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.