Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/dbsec/dbsec2008.bht:"
@inproceedings{DBLP:conf/dbsec/AlawnehA08, author = {Muntaha Alawneh and Imad M. Abbadi}, editor = {Vijay Atluri}, title = {Sharing but Protecting Content Against Internal Leakage for Organisations}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {238--253}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_19}, doi = {10.1007/978-3-540-70567-3\_19}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AlawnehA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Anderson08, author = {Ross J. Anderson}, editor = {Vijay Atluri}, title = {Security, Functionality and Scale?}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {64}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_5}, doi = {10.1007/978-3-540-70567-3\_5}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Anderson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ArdagnaVGJS08, author = {Claudio Agostino Ardagna and Sabrina De Capitani di Vimercati and Tyrone Grandison and Sushil Jajodia and Pierangela Samarati}, editor = {Vijay Atluri}, title = {Regulating Exceptions in Healthcare Using Policy Spaces}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {254--267}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_20}, doi = {10.1007/978-3-540-70567-3\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ArdagnaVGJS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Barker08, author = {Steve Barker}, editor = {Vijay Atluri}, title = {Dynamic Meta-level Access Control in {SQL}}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {1--16}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_1}, doi = {10.1007/978-3-540-70567-3\_1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Barker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarkerCCLT08, author = {Steve Barker and David W. Chadwick and Jason Crampton and Emil Lupu and Bhavani Thuraisingham}, editor = {Vijay Atluri}, title = {Panel Session: What Are the Key Challenges in Distributed Security?}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {219--221}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_17}, doi = {10.1007/978-3-540-70567-3\_17}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarkerCCLT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CarminatiF08, author = {Barbara Carminati and Elena Ferrari}, editor = {Vijay Atluri}, title = {Privacy-Aware Collaborative Access Control in Web-Based Social Networks}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {81--96}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_7}, doi = {10.1007/978-3-540-70567-3\_7}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/CarminatiF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DhankharKW08, author = {Vijayant Dhankhar and Saket Kaushik and Duminda Wijesekera}, editor = {Vijay Atluri}, title = {Securing Workflows with XACML, {RDF} and {BPEL}}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {330--345}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_25}, doi = {10.1007/978-3-540-70567-3\_25}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/DhankharKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DongRD08, author = {Changyu Dong and Giovanni Russello and Naranker Dulay}, editor = {Vijay Atluri}, title = {Shared and Searchable Encrypted Data for Untrusted Servers}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {127--143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_10}, doi = {10.1007/978-3-540-70567-3\_10}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/DongRD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DutaB08, author = {Angela Cristina Duta and Ken Barker}, editor = {Vijay Atluri}, title = {{P4A:} {A} New Privacy Model for {XML}}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {65--80}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_6}, doi = {10.1007/978-3-540-70567-3\_6}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/DutaB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/El-FotouhD08, author = {Mohamed Abo El{-}Fotouh and Klaus Diepold}, editor = {Vijay Atluri}, title = {The Analysis of Windows Vista Disk Encryption Algorithm}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {113--126}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_9}, doi = {10.1007/978-3-540-70567-3\_9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/El-FotouhD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/GoyalGG08, author = {Vikram Goyal and Shyam K. Gupta and Anand Gupta}, editor = {Vijay Atluri}, title = {A Unified Audit Expression Model for Auditing {SQL} Queries}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {33--47}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_3}, doi = {10.1007/978-3-540-70567-3\_3}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/GoyalGG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HannaLFD08, author = {Aiman Hanna and Hai Zhou Ling and Jason Furlong and Mourad Debbabi}, editor = {Vijay Atluri}, title = {Towards Automation of Testing High-Level Security Properties}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {268--282}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_21}, doi = {10.1007/978-3-540-70567-3\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HannaLFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Hernandez-GoyaCDMC08, author = {Candelaria Hern{\'{a}}ndez{-}Goya and Pino Caballero{-}Gil and Oscar Delgado{-}Mohatar and Jezabel Molina{-}Gil and C{\'{a}}ndido Caballero{-}Gil}, editor = {Vijay Atluri}, title = {Using New Tools for Certificate Repositories Generation in MANETs}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {175--189}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_14}, doi = {10.1007/978-3-540-70567-3\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Hernandez-GoyaCDMC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LuHVA08, author = {Haibing Lu and Xiaoyun He and Jaideep Vaidya and Nabil R. Adam}, editor = {Vijay Atluri}, title = {Secure Construction of Contingency Tables from Distributed Data}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {144--157}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_11}, doi = {10.1007/978-3-540-70567-3\_11}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/LuHVA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MaT08, author = {Di Ma and Gene Tsudik}, editor = {Vijay Atluri}, title = {A New Approach to Secure Logging}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {48--63}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_4}, doi = {10.1007/978-3-540-70567-3\_4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/MaT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/NagarajanVHA08, author = {Aarthi Nagarajan and Vijay Varadharajan and Michael Hitchens and Saurabh Arora}, editor = {Vijay Atluri}, title = {On the Applicability of Trusted Computing in Distributed Authorization Using Web Services}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {222--237}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_18}, doi = {10.1007/978-3-540-70567-3\_18}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/NagarajanVHA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayPD08, author = {Indrajit Ray and Nayot Poolsappasit and Rinku Dewri}, editor = {Vijay Atluri}, title = {An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {297--312}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_23}, doi = {10.1007/978-3-540-70567-3\_23}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/RayPD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RoichmanG08, author = {Alex Roichman and Ehud Gudes}, editor = {Vijay Atluri}, title = {DIWeDa - Detecting Intrusions in Web Databases}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {313--329}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_24}, doi = {10.1007/978-3-540-70567-3\_24}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/RoichmanG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Singhal08, author = {Anoop Singhal}, editor = {Vijay Atluri}, title = {Web Services Security: Techniques and Challenges (Extended Abstract)}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {158}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_12}, doi = {10.1007/978-3-540-70567-3\_12}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Singhal08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/TaoTTTY08, author = {Youdong Tao and Yunhai Tong and Shaohua Tan and Shiwei Tang and Dongqing Yang}, editor = {Vijay Atluri}, title = {Protecting the Publishing Identity in Multiple Tuples}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {205--218}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_16}, doi = {10.1007/978-3-540-70567-3\_16}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/TaoTTTY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ToahchoodeeR08, author = {Manachai Toahchoodee and Indrakshi Ray}, editor = {Vijay Atluri}, title = {On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {17--32}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_2}, doi = {10.1007/978-3-540-70567-3\_2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ToahchoodeeR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VerslypeDNNLV08, author = {Kristof Verslype and Bart De Decker and Vincent Naessens and Girma Nigusse and Jorn Lapon and Pieter Verhaeghe}, editor = {Vijay Atluri}, title = {A Privacy-Preserving Ticketing System}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {97--112}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_8}, doi = {10.1007/978-3-540-70567-3\_8}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/VerslypeDNNLV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WalleckLX08, author = {Daryl Walleck and Yingjiu Li and Shouhuai Xu}, editor = {Vijay Atluri}, title = {Empirical Analysis of Certificate Revocation Lists}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {159--174}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_13}, doi = {10.1007/978-3-540-70567-3\_13}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WalleckLX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangILSJ08, author = {Lingyu Wang and Tania Islam and Tao Long and Anoop Singhal and Sushil Jajodia}, editor = {Vijay Atluri}, title = {An Attack Graph-Based Probabilistic Security Metric}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {283--296}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_22}, doi = {10.1007/978-3-540-70567-3\_22}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangILSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZhangWJB08, author = {Lei Zhang and Lingyu Wang and Sushil Jajodia and Alexander Brodsky}, editor = {Vijay Atluri}, title = {Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {190--204}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_15}, doi = {10.1007/978-3-540-70567-3\_15}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ZhangWJB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2008, editor = {Vijay Atluri}, title = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3}, doi = {10.1007/978-3-540-70567-3}, isbn = {978-3-540-70566-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.