


default search action
18. DBSec 2004: Sitges, Catalonia, Spain
- Csilla Farkas, Pierangela Samarati:

Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain. IFIP 144, Kluwer/Springer 2004, ISBN 1-4020-8127-8
Invited Talk I
- Lawrence H. Cox:

Invited Talk - Inference Control Problems in Statistical Database Query Systems. 1-13
Access Control
- Jaehong Park, Xinwen Zhang, Ravi S. Sandhu:

Attribute Mutability in Usage Control. 15-29 - Vijayalakshmi Atluri

, Qi Guo:
STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. 31-47 - Andreas Schaad:

An Extended Analysis of Delegating Obligations. 49-64 - Indrakshi Ray, Tai Xin:

Implementing Real-Time Update of Access Control Policies. 65-80
Data Protection Techniques
- Yingjiu Li, Vipin Swarup, Sushil Jajodia:

Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. 81-94 - Hakan Hacigümüs, Sharad Mehrotra:

Performance-Conscious Key Management in Encrypted Databases. 95-109 - Yanjun Zuo, Brajendra Panda:

Damage Discovery in Distributed Database Systems. 111-123
Database Theory and Inference Control
- Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce:

Information Flow Analysis for File Systems and Databases Using Labels. 125-141 - Joachim Biskup, Torben Weibert:

Refusal in Incomplete Databases. 143-157 - Aybar C. Acar

, Amihai Motro:
Why Is this User Asking so Many Questions? Explaining Sequences of Queries. 159-176
Invited Talk II
- Ernesto Damiani

, Sabrina De Capitani di Vimercati:
Invited Talk - Towards Semantics-Aware Access Control. 177-188
System Security Analysis
- Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting:

RBAC/MAC Security Analysis and Design for UML. 189-203 - Inja Youn, Duminda Wijesekera:

Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. 205-218
Access Control Design and Management
- Ravi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley:

Policy-based Security Management for Enterprise Systems. 219-233 - Torsten Priebe

, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul:
A Pattern System for Access Control. 235-249 - Mei Ge, Sylvia L. Osborn:

A Design for Parameterized Roles. 251-264
Distributed Systems
- Ladislav Huraj, Helmut Reiser

:
Efficient Verification of Delegation in Distributed Group Membership Management. 265-280 - Steve Barker:

Web Resource Usage Control in RSCLP. 281-294 - Indrajit Ray, Tomas Hajek:

Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. 295-309
Privacy
- Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen:

On The Damage and Compensation of Privacy Leakage. 311-324 - Emmanuel D. Pontikakis, Achilleas A. Tsitsonis, Vassilios S. Verykios

:
An Experimental Study of Distortion-Based Techniques for Association Rule Hiding. 325-339 - Justin Zhijun Zhan, LiWu Chang, Stan Matwin:

Privacy-Preserving Multi-Party Decision Tree Induction. 341-355
Network Protection and Configuration
- Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart:

Configuring Storage Area Networks for Mandatory Security. 357-370 - Joon S. Park, Abhishek Jain:

A Framework for Trusted Wireless Sensor Networks. 371-384

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














