Data and Applications Security XVII: Status and Prospects

Front Cover
Sabrina De Capitani di Vimercati, Indrajit Ray
Springer Science & Business Media, Jul 27, 2004 - Computers - 403 pages

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats.

Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include:
-Information Warfare,
-Information Assurance,
-Security and Privacy,
-Authorization and Access Control in Distributed Systems,
-Security Technologies for the Internet,
-Access Control Models and Technologies,
-Digital Forensics.

This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security.

Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

PART ONE Information Warfare
3
Improving Damage Assessment Efficacy in case of Frequent Attacks
16
PART TWO Information Assurance
32
Certifying Data from Multiple Sources Glen Nuckolls Chip Martel Stuart G Stubblebine
47
Ensuring the Integrity of Encrypted Databases in
61
Adapting Query Optimization Techniques for Efficient Alert
75
PART THREE Security and Privacy
91
Privacy under Conditions of Concurrent Interaction with Multiple
105
Marco Cremonini Ernesto Damiani Pierangela Samarati
243
PART SIX Access Control Models and Technologies
275
RBAC Policy Implementation for SQL Databases Steve Barker Paul Douglas
288
An Administrative Model for Role Graphs He Wang Sylvia L Osborn
302
Safety and Liveness for an RBACMAC Security Model Charles Phillips Steven Demurjian T C Ting
316
RBAC Approach
331
Persistent versus Dynamic Role Membership Jean Bacon David W Chadwick Oleksandr Otenko Ken Moody
344
A Flexible Flow Control Policy Specification
358

Querying Encrypted Databases 119
119
PART FOUR Authorization and Access Control in Distributed Systems
176
PART FIVE Security Technologies for the Internet
205
PART SEVEN Key Note
373
PART EIGHT Panel
393
Copyright

Other editions - View all

Common terms and phrases