Data and applications security. Developments and directions. IFIP TC11 / WG11. 3 14th annual working conference on database security, Schoorl, the Netherlands, August 21--23, 2000 (Q5948898)

From MaRDI portal
scientific article; zbMATH DE number 1672405
Language Label Description Also known as
English
Data and applications security. Developments and directions. IFIP TC11 / WG11. 3 14th annual working conference on database security, Schoorl, the Netherlands, August 21--23, 2000
scientific article; zbMATH DE number 1672405

    Statements

    Data and applications security. Developments and directions. IFIP TC11 / WG11. 3 14th annual working conference on database security, Schoorl, the Netherlands, August 21--23, 2000 (English)
    0 references
    12 November 2001
    0 references
    The articles of this volume will be reviewed individually. The 1990 conference has been reviewed (see Zbl 0770.68017). Indexed articles: \textit{Wiederhold, Gio}, Protecting information when access is granted for collaboration, 1-14 [Zbl 0991.68606] \textit{Bertino, E.; Braun, M.; Castano, S.; Ferrari, E.; Mesiti, M.}, Author-\(\chi\): A Java-based system for XML data protection, 15-26 [Zbl 0997.68027] \textit{Ray, Indrajit; Ray, Indrakshi; Narasimhamurthi, Natarajan}, A fair-exchange \(e\)-commerce protocol with automated dispute resolution, 27-38 [Zbl 1002.68011] \textit{Damiani, E.; De Capitani di Vimercati, S.; Paraboschi, S.; Samarati, P.}, XML access control systems: A component-based approach, 39-50 [Zbl 1052.68591] \textit{Hardy, Alexandre; Olivier, Martin S.}, A configurable security architecture prototype, 51-62 [Zbl 1003.68730] \textit{Chapin, Susan; Faatz, Don; Jajodia, Sushil}, Distributed policies for data management -- making policies mobile, 63-75 [Zbl 0999.68620] \textit{Altenschmidt, Christian; Biskup, Joachim; Karabulut, Yücel}, Security architecture of the multimedia mediator, 77-88 [Zbl 0999.68621] \textit{Papa, M.; Bremer, O.; Magill, S.; Hale, J.; Shenoi, S.}, Simulation and analysis of cryptographic protocols, 89-100 [Zbl 0997.68043] \textit{Devanbu, Premkumar; Gertz, Michael; Martel, Charles; Stubblebine, Stuart G.}, Authentic third-party data publication, 101-112 [Zbl 0997.68031] \textit{Barbará, Daniel; Goel, Rajni; Jajodia, Sushil}, Protecting file systems against corruption using checksums, 113-124 [Zbl 0997.68044] \textit{Moody, Ken}, Coordinating policy for federated applications, 127-134 [Zbl 0999.68622] \textit{Oliva, Marta; Saltor, Félix}, Integrating multilevel security policies in multilevel federated database systems, 135-147 [Zbl 0999.68623] \textit{Olivier, Martin S.; Gudes, Ehud}, Wrappers -- a mechanism to support state-based authorization in web applications, 149-160 [Zbl 1003.68731] \textit{Chang, LiWu; Moskowitz, Ira S.}, An integrated framework for database privacy protection, 161-172 [Zbl 1003.68503] \textit{Chung, Christina Yip; Gertz, Michael; Levitt, Karl}, Discovery of multi-level security policies, 173-184 [Zbl 0997.68162] \textit{Barker, Steve}, Protecting deductive databases from unauthorized retrievals, 185-196 [Zbl 0997.68032] \textit{Spalka, Adrian; Cremers, Armin B.}, Confidentiality vs integrity in secure databases, 197-208 [Zbl 0999.68624] \textit{Rosenthal, Arnon; Sciore, Edward}, Extending SQL's grant operation to limit privileges, 209-220 [Zbl 0997.68033] \textit{Hale, J.; Chandia, R.; Campbell, C.; Papa, M.; Shenoi, S.}, Language extensions for programmable security, 221-232 [Zbl 0997.68045] \textit{Chun, Soon Ae; Atluri, Vijayalakshmi}, Protecting privacy from continuous high-resolution satellite surveillance, 233-244 [Zbl 0999.68625] \textit{Osborn, Sylvia}, Database security integration using role-based access control, 245-257 [Zbl 1002.68048] \textit{Demurjian, S.; Ting, T. C.; Balthazar, J.; Ren, H.; Phillips, C.; Barr, P.}, User role-based security model for a distributed environment, 259-270 [Zbl 0991.68607] \textit{Teepe, Wouter; van de Riet, Reind; Olivier, Martin}, WorkFlow analyzed for security and privacy in using databases, 271-282 [Zbl 1002.68762] \textit{Steger, Jürgen; Günzel, Holger; Bauer, Andreas}, Identifying security holes in OLAP applications, 283-294 [Zbl 0997.68034] \textit{Donner, Marc; Nochlin, David; Shasha, Dennis; Walasek, Wendy}, Algorithms and experience in increasing the intelligibility and hygiene of access control in large organizations, 295-316 [Zbl 0991.68608] \textit{Campbell, John R.}, Database security 2000, 317-321 [Zbl 0999.68626] \textit{Jamil, Hasan M.}, Declarative semantics of belief queries in MLS deductive databases, 323-328 [Zbl 0997.68035] \textit{Michael, James B.; Gaines, Leonard T.}, Trust management in distributed databases, 329-337 [Zbl 0999.68628] \textit{Cvrček, Daniel}, Active authorization as high-level control, 339-345 [Zbl 0999.68627] \textit{Barmawi, Ari Moesriami; Takada, Shingo; Doi, Norihisa}, Conference key agreement protocol using oblivious transfer, 347-353 [Zbl 0997.68046] \textit{Oh, Sejong; Park, Soeg}, An integration model of role-based access control and activity-based access control using task, 355-360 [Zbl 0999.68629] \textit{Izaki, Keiji; Tanaka, Katsuya; Takizawa, Makoto}, Authorization model in object-oriented systems, 361-366 [Zbl 0997.68036]
    0 references
    Schoorl (Netherlands)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    IFIP
    0 references
    Database security
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references