Skip to main content
  • Conference proceedings
  • © 2006

Data and Applications Security XX

20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings

Conference proceedings info: DBSec 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Creating Objects in the Flexible Authorization Framework

    • Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
    Pages 1-14
  3. Detection and Resolution of Anomalies in Firewall Policy Rules

    • Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham
    Pages 15-29
  4. Consolidating the Access Control of Composite Applications and Workflows

    • Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz
    Pages 44-59
  5. Authenticating Multi-dimensional Query Results in Data Publishing

    • Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan
    Pages 60-73
  6. Xml Streams Watermarking

    • Julien Lafaye, David Gross-Amblard
    Pages 74-88
  7. Aggregation Queries in the Database-As-a-Service Model

    • Einar Mykletun, Gene Tsudik
    Pages 89-103
  8. Interactive Analysis of Attack Graphs Using Relational Queries

    • Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
    Pages 119-132
  9. Notarized Federated Identity Management for Web Services

    • Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
    Pages 133-147
  10. Resolving Information Flow Conflicts in RBAC Systems

    • Noa Tuval, Ehud Gudes
    Pages 148-162
  11. Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems

    • Saket Kaushik, William Winsborough, Duminda Wijesekera, Paul Ammann
    Pages 163-178
  12. Term Rewriting for Access Control

    • Steve Barker, Maribel Fernández
    Pages 179-193
  13. A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach

    • Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari
    Pages 209-223
  14. Enhancing User Privacy Through Data Handling Policies

    • C. A. Ardagna, S. De Capitani di Vimercati, P. Samarati
    Pages 224-236
  15. Efficient Enforcement of Security Policies Based on Tracking of Mobile Users

    • Vijayalakshmi Atluri, Heechang Shin
    Pages 237-251
  16. A Framework for Flexible Access Control in Digital Library Systems

    • Indrajit Ray, Sudip Chakraborty
    Pages 252-266
  17. Authrule: A Generic Rule-Based Authorization Module

    • Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe
    Pages 267-281

Other Volumes

  1. Data and Applications Security XX

About this book

For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch results, practical experiences, and innovative ideas in data and applications - curity. Looking back, it is di?cult not to appreciatethe full extent of the change that has occurred in our ?eld. Once considered afterthoughts in systems and application design, data protection, privacy and trust have become the key problems of our day. This central role of security in the information society has however brought increased responsibilities to the research community. - day practitioners and researchers alike need to ?nd new ways to cope with the increasing scale and complexity of the security problems that must be solved on the global information infrastructure. Like the previous conference, the 20th DBSEC has proved to be up to this challenge. DBSEC 2006 received 56 submissions, out of which the program committee selected22 high-qualitypaperscoveringanumber of diverseresearchtopicssuch as access control, privacy, and identity management. We are glad to see that the ?nal program contains a well-balanced mix of theoretical results and practical prototype systems, many of them converging and building o? each other. Also, the DBSEC program includes a number of papers on new, emerging aspects of security research. Putting together a top-level conference like DBSEC is always a team e?ort.

Editors and Affiliations

  • Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Italy

    Ernesto Damiani

  • The Logistics Institute, Northeastern University, Shenyang, China

    Peng Liu

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access