Search dblp for Publications

export results for "toc:db/conf/dbsec/dbsec2002.bht:"

 download as .bib file

@proceedings{DBLP:conf/dbsec/2002,
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  publisher    = {Kluwer},
  year         = {2003},
  isbn         = {1-4020-7541-3},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriM02,
  author       = {Vijayalakshmi Atluri and
                  Pietro Mazzoleni},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Uniform Indexing for Geospatial Data and Authorizations},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {207--218},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 07:52:21 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarbaraGJ02,
  author       = {Daniel Barbar{\'{a}} and
                  Rajni Goel and
                  Sushil Jajodia},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Mining Malicious Corruption of Data with Hidden Markov Models},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {175--189},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarbaraGJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Barker02,
  author       = {Steve Barker},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Deductive Database Security},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {103--114},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Barker02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarkerDF02,
  author       = {Steve Barker and
                  Paul Douglas and
                  Terry Fanning},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Implementing {RBAC} Policies},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {27--36},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarkerDF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BelokosztolszkiE02,
  author       = {Andr{\'{a}}s Belokosztolszki and
                  David M. Eyers},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Shielding {RBAC} Infrastructures from Cyberterrorism},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {3--14},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BelokosztolszkiE02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BertinoFM02,
  author       = {Elisa Bertino and
                  Elena Ferrari and
                  Giovanni Mella},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Distributed Cooperative Updates of {XML} Documents},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {147--159},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BertinoFM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BiskupK02,
  author       = {Joachim Biskup and
                  Y{\"{u}}cel Karabulut},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {A Hybrid {PKI} Model: Application to Secure Mediation},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {271--282},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Thu, 19 Feb 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BiskupK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CampbellDPFHP02,
  author       = {Clinton Campbell and
                  Jerald Dawkins and
                  Brandon Pollet and
                  Kenneth Fitch and
                  John Hale and
                  Mauricio Papa},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {On Modeling Computer Networks for Vulnerability Analysis},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {233--244},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CampbellDPFHP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChadwickOSST02,
  author       = {David W. Chadwick and
                  Martin S. Olivier and
                  Pierangela Samarati and
                  Eleanor Sharpston and
                  Bhavani Thuraisingham},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Privacy and Civil Liberties},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {331--346},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChadwickOSST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChangM02,
  author       = {Liwu Chang and
                  Ira S. Moskowitz},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {A Study of Inference Problems in Distributed Databases},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {191--204},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Tue, 27 Oct 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChangM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DamianiVFS02,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Pierangela Samarati},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Access Control of {SVG} Documents},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {219--230},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/DamianiVFS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DreyerO02,
  author       = {Lucas C. J. Dreyer and
                  Martin S. Olivier},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Implementing Workflow Systems},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {61--72},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/DreyerO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/IonitaO02,
  author       = {Cecilia Ionita and
                  Sylvia L. Osborn},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Privilege Administration for the Role Graph Model},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {15--25},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/IonitaO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JohnstenRH02,
  author       = {Tom Johnsten and
                  Vijay V. Raghavan and
                  Kevin Hill},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {On Security and Privacy Risks in Association Mining Algorithms},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {163--174},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Mon, 28 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JohnstenRH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LiebrandEPDT02,
  author       = {M. Liebrand and
                  Heidi J. C. Ellis and
                  Charles E. Phillips and
                  Steven A. Demurjian and
                  T. C. Ting},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Role Delegation for a Resource-Based Security Model},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {37--48},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LiebrandEPDT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LiuW02,
  author       = {Peng Liu and
                  Ying Wang},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Multiphase Damage Confinement System for Databases},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {75--87},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LiuW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MagillSPH02,
  author       = {Stephen Magill and
                  Bradley Skaggs and
                  Mauricio Papa and
                  John Hale},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Implementation and Verification of Programmable Security},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {285--299},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MagillSPH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MukkamalaDH02,
  author       = {Ravi Mukkamala and
                  Satyam Das and
                  Mahantesh Halappanavar},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Recertification: {A} Technique to Improve Services in {PKI}},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {259--270},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MukkamalaDH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RagothamanP02,
  author       = {Prahalad Ragothaman and
                  Brajendra Panda},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Analyzing Transaction Logs for Effective Damage Assessment},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {89--101},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RagothamanP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RayR02,
  author       = {Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Anonymous and Secure Multicast Subscription},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {313--327},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RayR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ReynoldsJLCM02,
  author       = {James C. Reynolds and
                  James E. Just and
                  Ed Lawson and
                  Larry A. Clough and
                  Ryan Maglich},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {On-line Intrusion Protection by Detecting Attacks with Diversity},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {245--256},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ReynoldsJLCM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RyanA02,
  author       = {Peter Ryan and
                  Ragni Ryvold Arnesen},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {A Process Algebraic Approach to Security Policies},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {301--312},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RyanA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ShinAC02,
  author       = {Dongwan Shin and
                  Gail{-}Joon Ahn and
                  Sangrae Cho},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Using {X.509} Attribute Certificates for Role-Based {EAM}},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {49--60},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ShinAC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/StoicaF02,
  author       = {Andrei Stoica and
                  Csilla Farkas},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Secure {XML} Views},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {133--146},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/StoicaF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangWJ02,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Towards Secure {XML} Federations},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {117--131},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Mon, 02 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics