default search action
19. DBSec 2005: Storrs, CT, USA
- Sushil Jajodia, Duminda Wijesekera:
Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3654, Springer 2005, ISBN 3-540-28138-X - Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck, Divesh Srivastava:
Streams, Security and Scalability. 1-15 - Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Towards Privacy-Enhanced Authorization Policies and Languages. 16-27 - Andreas Schaad:
Revocation of Obligation and Authorisation Policy Objects. 28-39 - Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting:
Role Slices: A Notation for RBAC Permission Assignment and Enforcement. 40-53 - Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes:
Designing Secure Indexes for Encrypted Databases. 54-68 - Jun Li, Edward Omiecinski:
Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. 69-83 - Glen Nuckolls:
Verified Query Results from Hybrid Authentication Trees. 84-98 - Inja Youn, Csilla Farkas, Bhavani Thuraisingham:
Multilevel Secure Teleconferencing over Public Switched Telephone Network. 99-113 - Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu:
Secrecy of Two-Party Secure Computation. 114-123 - Tai Xin, Yajie Zhu, Indrakshi Ray:
Reliable Scheduling of Advanced Transactions. 124-138 - Jaideep Vaidya, Chris Clifton:
Privacy-Preserving Decision Trees over Vertically Partitioned Data. 139-152 - Justin Zhijun Zhan, Stan Matwin, LiWu Chang:
Privacy-Preserving Collaborative Association Rule Mining. 153-165 - Wei Jiang, Chris Clifton:
Privacy-Preserving Distributed k-Anonymity. 166-177 - Kun Bai, Alex Hai Wang, Peng Liu:
Towards Database Firewalls. 178-192 - Alex X. Liu, Mohamed G. Gouda:
Complete Redundancy Detection in Firewalls. 193-206 - Adrian Spalka, Jan Lehnhardt:
A Comprehensive Approach to Anomaly Detection in Relational Databases. 207-221 - Sarath Indrakanti, Vijay Varadharajan:
An Authorization Architecture for Web Services. 222-236 - Guang-Lei Song, Kang Zhang, Bhavani Thuraisingham, Jun Kong:
Secure Model Management Operations for the Web. 237-251 - Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala:
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. 252-266 - Joachim Biskup, Barbara Sprick, Lena Wiese:
Secure Mediation with Mobile Code. 267-280 - Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray:
Security Vulnerabilities in Software Systems: A Quantitative Perspective. 281-294 - Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert:
Trading Off Security in a Service Oriented Architecture. 295-309 - Joon S. Park, Harish S. Krishnan:
Trusted Identity and Session Management Using Secure Cookies. 310-324 - Murat Kantarcioglu, Chris Clifton:
Security Issues in Querying Encrypted Data. 325-337 - Amihai Motro, Francesco Parisi-Presicce:
Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. 338-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.