Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings
For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of the change that has occurred in our ?eld. Once considered afterthoughts in systems and application design, data protection, privacy and trust have become the key problems of our day. This central role of security in the information society has however brought increased responsibilities to the research community. - day practitioners and researchers alike need to ?nd new ways to cope with the increasing scale and complexity of the security problems that must be solved on the global information infrastructure. Like the previous conference, the 20th DBSEC has proved to be up to this challenge. DBSEC 2006 received 56 submissions, out of which the program committee selected22 high-qualitypaperscoveringanumber of diverseresearchtopicssuch as access control, privacy, and identity management. We are glad to see that the ?nal program contains a well-balanced mix of theoretical results and practical prototype systems, many of them converging and building o? each other. Also, the DBSEC program includes a number of papers on new, emerging aspects of security research. Putting together a top-level conference like DBSEC is always a team e?ort.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access control models access control policies access privileges access request administrative domains aggregation algorithm analysis annotation anomalies application assertion attack graph attributes authentication authorization model certiﬁcate ciphertexts client Computer conﬁguration conﬂicts constraints CPublicKey credentials data handling policies database DCSR decryption deﬁned Deﬁnition denote detours diﬀerent digital library discretionary access control eﬀective eﬃcient evaluation example federated identity federated identity management ﬁle ﬁnd ﬁrewall ﬁrst framework homomorphic encryption identiﬁed identity management identity provider IEEE IFIP implementation information ﬂow input iteration label leakage login module moving objects newruleslist node notary server partition perform permissions predicate proﬁle proposed protocol public key query RBAC relation result rewrite system role hierarchy role-based Role-Based Access Control rules satisﬁed scheme Section separation of duty sequence service provider signature spatiotemporal speciﬁcation stream tion tuples user’s userService valid veriﬁes watermarking workﬂow WS-CDL XACML XPath