Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings

Author:   Steve Barker ,  Gail-Joon Ahn
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2007 ed.
Volume:   4602
ISBN:  

9783540735335


Pages:   293
Publication Date:   22 June 2007
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $237.47 Quantity:  
Add to Cart

Share |

Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Steve Barker ,  Gail-Joon Ahn
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2007 ed.
Volume:   4602
Dimensions:   Width: 15.50cm , Height: 1.50cm , Length: 23.50cm
Weight:   0.468kg
ISBN:  

9783540735335


ISBN 10:   354073533
Pages:   293
Publication Date:   22 June 2007
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Secure Query Evaluation.- Confidentiality Policies for Controlled Query Evaluation.- Provably-Secure Schemes for Basic Query Support in Outsourced Databases.- Authenticated Relational Tables and Authenticated Skip Lists.- Location-Based Security/Mobile Security.- Location Privacy Protection Through Obfuscation-Based Techniques.- Efficient Security Policy Enforcement in a Location Based Service Environment.- Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.- Short Papers.- Privacy-Preserving Schema Matching Using Mutual Information.- The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.- Distributed Security Issues.- Measuring the Overall Security of Network Configurations Using Attack Graphs.- Enforcing Honesty in Assured Information Sharing Within a Distributed System.- A Privacy-Enhanced Attribute-Based Access Control System.- Cryptographic-Based Security.- A Scalable and Secure Cryptographic Service.- gVault: A Gmail Based Cryptographic Network File System.- Design and Analysis of Querying Encrypted Data in Relational Databases.- Temporal Access Control and Usage Control.- Dynamic Event-Based Access Control as Term Rewriting.- A Spatio-temporal Role-Based Access Control Model.- Towards a Times-Based Usage Control Model.- System Security Issues.- New Paradigm of Inference Control with Trusted Computing.- Security Patterns for Physical Access Control Systems.- XACML Policies for Exclusive Resource Usage.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List