Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings
Sara Foresti, Sushil Jajodia
Springer Science & Business Media, Jun 9, 2010 - Business & Economics - 376 pages
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available.
The scope of LNCS, including its subseries LNAI and LNBI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.
In parallel to the printed book, each new volume is published electronically in LNCS Online.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
AC rules access control models access control policy algorithm anonymized application approach assignment attacks attribute authentication authentication factors Bayawak bbPIR certiﬁcation classiﬁer client component computation conﬁdentiality counterexamples cPIR credential data set database decision tree decryption deﬁned deﬁnition denote derived detect diﬀerent eﬀect eﬃcient encryption enforcement evaluation example ﬁlter ﬁnd ﬁrst ﬂow function hash hash chain identiﬁed IEEE implementation implication relations information source k-Anonymity knowledge domain label LNCS Mashup matrix meta-model nodes noise paper party peers performance permissions platform private information retrieval proﬁle proposed protocol provenance owner query RBAC RDF triples request result retrieval RFID card Rnew Role-Based Access Control RSS feeds satisﬁed scalable scheme secret Section security level server session skip list solution spam SPARQL speciﬁc TBox technique Token trust tuples user’s values vector vender machine veriﬁcation web applications workﬂow XACML