Skip to main content

Data and Applications Security XXI

21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings

  • Conference proceedings
  • © 2007

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4602)

Included in the following conference series:

Conference proceedings info: DBSec 2007.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (20 papers)

  1. Secure Query Evaluation

  2. Location-Based Security/Mobile Security

  3. Short Papers

  4. Distributed Security Issues

  5. Cryptographic-Based Security

  6. Temporal Access Control and Usage Control

  7. System Security Issues

Other volumes

  1. Data and Applications Security XXI

Keywords

About this book

This volume contains the papers presented at the 21st Annual IFIP WG 11.3 Conference on Data and Applications Security (DBSEC) held July 8–11 in - dondo Beach, California, USA. The purpose of the DBSEC conference is to disseminate original research results and experience reports in data and app- cations security. In response to the call for papers, 44 submissions were received. Following a rigorousreviewingprocess,18high-qualitypaperswereacceptedforpresentation and publication. In addition, two short papers were selected for poster pres- tation. The conference program also included one invited talk and one panel discussion. We believe that the program includes a balanced mix of practical experiences and theoretical results that consolidate existing work and suggest emerging areas of interest for researchers in data and applications security. The continued success of the DBSEC conference is due to the e?orts of many individuals. We would like to thank all of the researchers that submitted - pers to DBSEC for consideration, and the Program Committee members and additional reviewers for making the review process fair and thorough, and for providing valuable suggestions on each submission. We are also indebted to the invited speakers and panelists for their contributions to the success of the c- ference.

Bibliographic Information

Publish with us