Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/dbsec/dbsec2002.bht:"
@proceedings{DBLP:conf/dbsec/2002, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, publisher = {Kluwer}, year = {2003}, isbn = {1-4020-7541-3}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriM02, author = {Vijayalakshmi Atluri and Pietro Mazzoleni}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Uniform Indexing for Geospatial Data and Authorizations}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {207--218}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 07:52:21 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarbaraGJ02, author = {Daniel Barbar{\'{a}} and Rajni Goel and Sushil Jajodia}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Mining Malicious Corruption of Data with Hidden Markov Models}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {175--189}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarbaraGJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Barker02, author = {Steve Barker}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Deductive Database Security}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {103--114}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Barker02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarkerDF02, author = {Steve Barker and Paul Douglas and Terry Fanning}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Implementing {RBAC} Policies}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {27--36}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarkerDF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BelokosztolszkiE02, author = {Andr{\'{a}}s Belokosztolszki and David M. Eyers}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Shielding {RBAC} Infrastructures from Cyberterrorism}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {3--14}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BelokosztolszkiE02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BertinoFM02, author = {Elisa Bertino and Elena Ferrari and Giovanni Mella}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Distributed Cooperative Updates of {XML} Documents}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {147--159}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BertinoFM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BiskupK02, author = {Joachim Biskup and Y{\"{u}}cel Karabulut}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {A Hybrid {PKI} Model: Application to Secure Mediation}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {271--282}, publisher = {Kluwer}, year = {2002}, timestamp = {Thu, 19 Feb 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BiskupK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CampbellDPFHP02, author = {Clinton Campbell and Jerald Dawkins and Brandon Pollet and Kenneth Fitch and John Hale and Mauricio Papa}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {On Modeling Computer Networks for Vulnerability Analysis}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {233--244}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CampbellDPFHP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ChadwickOSST02, author = {David W. Chadwick and Martin S. Olivier and Pierangela Samarati and Eleanor Sharpston and Bhavani Thuraisingham}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Privacy and Civil Liberties}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {331--346}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ChadwickOSST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ChangM02, author = {Liwu Chang and Ira S. Moskowitz}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {A Study of Inference Problems in Distributed Databases}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {191--204}, publisher = {Kluwer}, year = {2002}, timestamp = {Tue, 27 Oct 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ChangM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DamianiVFS02, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Eduardo Fern{\'{a}}ndez{-}Medina and Pierangela Samarati}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Access Control of {SVG} Documents}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {219--230}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/DamianiVFS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/DreyerO02, author = {Lucas C. J. Dreyer and Martin S. Olivier}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Implementing Workflow Systems}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {61--72}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/DreyerO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/IonitaO02, author = {Cecilia Ionita and Sylvia L. Osborn}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Privilege Administration for the Role Graph Model}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {15--25}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/IonitaO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JohnstenRH02, author = {Tom Johnsten and Vijay V. Raghavan and Kevin Hill}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {On Security and Privacy Risks in Association Mining Algorithms}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {163--174}, publisher = {Kluwer}, year = {2002}, timestamp = {Mon, 28 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JohnstenRH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LiebrandEPDT02, author = {M. Liebrand and Heidi J. C. Ellis and Charles E. Phillips and Steven A. Demurjian and T. C. Ting}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Role Delegation for a Resource-Based Security Model}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {37--48}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LiebrandEPDT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LiuW02, author = {Peng Liu and Ying Wang}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Multiphase Damage Confinement System for Databases}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {75--87}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LiuW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MagillSPH02, author = {Stephen Magill and Bradley Skaggs and Mauricio Papa and John Hale}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Implementation and Verification of Programmable Security}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {285--299}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MagillSPH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MukkamalaDH02, author = {Ravi Mukkamala and Satyam Das and Mahantesh Halappanavar}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Recertification: {A} Technique to Improve Services in {PKI}}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {259--270}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MukkamalaDH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RagothamanP02, author = {Prahalad Ragothaman and Brajendra Panda}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Analyzing Transaction Logs for Effective Damage Assessment}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {89--101}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RagothamanP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RayR02, author = {Indrajit Ray and Indrakshi Ray}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Anonymous and Secure Multicast Subscription}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {313--327}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RayR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ReynoldsJLCM02, author = {James C. Reynolds and James E. Just and Ed Lawson and Larry A. Clough and Ryan Maglich}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {On-line Intrusion Protection by Detecting Attacks with Diversity}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {245--256}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ReynoldsJLCM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RyanA02, author = {Peter Ryan and Ragni Ryvold Arnesen}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {A Process Algebraic Approach to Security Policies}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {301--312}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RyanA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ShinAC02, author = {Dongwan Shin and Gail{-}Joon Ahn and Sangrae Cho}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Using {X.509} Attribute Certificates for Role-Based {EAM}}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {49--60}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ShinAC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/StoicaF02, author = {Andrei Stoica and Csilla Farkas}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Secure {XML} Views}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {133--146}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/StoicaF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangWJ02, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Towards Secure {XML} Federations}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {117--131}, publisher = {Kluwer}, year = {2002}, timestamp = {Mon, 02 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.