Skip to main content
  • Conference proceedings
  • © 2008

Data and Applications Security XXII

22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008, Proceedings

Editors:

Conference proceedings info: DBSec 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Access Control

    1. On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model

      • Manachai Toahchoodee, Indrakshi Ray
      Pages 17-32
  3. Audit and Logging

    1. A Unified Audit Expression Model for Auditing SQL Queries

      • Vikram Goyal, S. K. Gupta, Anand Gupta
      Pages 33-47
    2. A New Approach to Secure Logging

      • Di Ma, Gene Tsudik
      Pages 48-63
  4. Keynote

    1. Security, Functionality and Scale?

      • Ross Anderson
      Pages 64-64
  5. Privacy I

    1. P4A: A New Privacy Model for XML

      • Angela C. Duta, Ken Barker
      Pages 65-80
    2. A Privacy-Preserving Ticketing System

      • Kristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe
      Pages 97-112
    3. Systems Security

      1. The Analysis of Windows Vista Disk Encryption Algorithm
        • Mohamed Abo El-Fotouh, Klaus Diepold
        Pages 113-126
      2. Shared and Searchable Encrypted Data for Untrusted Servers
        • Changyu Dong, Giovanni Russello, Naranker Dulay
        Pages 127-143
      3. Secure Construction of Contingency Tables from Distributed Data
        • Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil Adam
        Pages 144-157
    4. Certificate Management

      1. Empirical Analysis of Certificate Revocation Lists
        • Daryl Walleck, Yingjiu Li, Shouhuai Xu
        Pages 159-174
      2. Using New Tools for Certificate Repositories Generation in MANETs
        • Candelaria Hernández-Goya, Pino Caballero-Gil, Oscar Delgado-Mohatar, Jezabel Molina-Gil, Cándido Caballero-Gil
        Pages 175-189
  6. Privacy II

    1. Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure

      • Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky
      Pages 190-204
    2. Protecting the Publishing Identity in Multiple Tuples

      • Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang
      Pages 205-218
    3. Panel

      1. Panel Session: What Are the Key Challenges in Distributed Security?
        • Steve Barker, David Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham
        Pages 219-221
    4. Trusted Computing Platforms

      1. On the Applicability of Trusted Computing in Distributed Authorization Using Web Services
        • Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora
        Pages 222-237

Other Volumes

  1. Data and Applications Security XXII

About this book

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 high-quality research papers, which were selected from a total of 56 submissions after a rigorous reviewing process by the Program Committee members and external reviewers. These sessions included such topics as access control, privacy, auditing, systems security and data security in advanced app- cation domains. In addition, the programincluded a keynote address, an invited talk and a panel session. The success of this conference was a result of the e?orts of many people. I would like to extend my appreciation to the Program Committee members and external reviewers for their hard work. I would like to thank the General Chair, SteveBarker,fortakingcareoftheorganizationaspectsoftheconferenceandfor arranging the keynote address and the panel session. I would also like to thank Claudio Ardagna for serving as the Publicity Chair and for promptly updating the conference Web page, and Don Lokuadassuriyage for serving as the Local Arrangements Chair. Special thanks go to Alfred Hofmann, Editorial Director at Springer, for agreeing to include these conference proceedings in the Lecture Notes in Computer Science series.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access