Eintrag weiter verarbeiten

Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

Gespeichert in:

Personen und Körperschaften: Foresti, Sara (VerfasserIn), Jajodia, Sushil (Sonstige)
Titel: Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings/ edited by Sara Foresti, Sushil Jajodia
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2010
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 6166
Schlagwörter:
Buchausg. u.d.T.: Data and applications security and privacy XXIV, Berlin : Springer, 2010, XIII, 376 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 08914cam a22015972 4500
001 0-165008983X
003 DE-627
005 20240122105256.0
007 cr uuu---uuuuu
008 100901s2010 gw |||||o 00| ||eng c
020 |a 9783642137396  |9 978-3-642-13739-6 
024 7 |a 10.1007/978-3-642-13739-6  |2 doi 
035 |a (DE-627)165008983X 
035 |a (DE-576)329516515 
035 |a (DE-599)BSZ329516515 
035 |a (OCoLC)664679206 
035 |a (OCoLC)851046642 
035 |a (ZBM)1197.68010 
035 |a (DE-He213)978-3-642-13739-6 
035 |a (EBP)040525937 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE 
050 0 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
084 |a SS 4800  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *68-06  |2 msc 
084 |a 68P25  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.64  |2 bkl 
084 |a 54.38  |2 bkl 
100 1 |a Foresti, Sara  |4 aut 
245 1 0 |a Data and Applications Security and Privacy XXIV  |b 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings  |c edited by Sara Foresti, Sushil Jajodia 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010 
300 |a Online-Ressource (XIII, 376p. 80 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 6166 
490 0 |a SpringerLink  |a Bücher 
520 |a Query and Data Privacy -- Generalizing PIR for Practical Private Retrieval of Public Data -- A Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure Outsourcing of DNA Searching via Finite Automata -- A Labelling System for Derived Data Control -- On the Identification of Property Based Generalizations in Microdata Anonymization -- Access Control -- Role Mining in the Presence of Noise -- Distributed and Secure Access Control in P2P Databases -- Constructing Key Assignment Schemes from Chain Partitions -- Data Confidentiality and Query Verification -- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality -- Efficient Inference Control for Open Relational Queries -- Query Racing: Fast Completeness Certification of Query Results -- Policy Definition and Enforcement -- Mining Likely Properties of Access Control Policies via Association Rule Mining -- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control -- Enforcing Request Integrity in Web Applications -- Trust and Identity Management -- Using Trust-Based Information Aggregation for Predicting Security Level of Systems -- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms -- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms -- Short Papers -- An Access Control Model for Web Databases -- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems -- Evaluating the Risk of Adopting RBAC Roles -- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance -- When ABE Meets RSS -- PriMan : A Privacy-Preserving Identity Framework -- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach -- Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach -- A Secure RFID Ticket System for Public Transport -- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols -- Secure Location Verification. 
520 |a This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Computer software 
650 0 |a Information systems 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Data encryption (Computer science) 
650 0 |a Information storage and retrieval systems 
650 0 |a Computer networks . 
650 0 |a Electronic data processing 
650 0 |a Application software. 
650 0 |a Algorithms. 
650 0 |a Cryptography. 
655 7 |a Konferenzschrift  |y 2010  |z Rom  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 0 1 |D s  |0 (DE-588)4293034-0  |0 (DE-627)104199954  |0 (DE-576)210933003  |a Zugriffskontrolle  |2 gnd 
689 0 2 |D s  |0 (DE-588)4113276-2  |0 (DE-627)105830550  |0 (DE-576)209475145  |a Datenbanksystem  |2 gnd 
689 0 3 |D s  |0 (DE-588)4378490-2  |0 (DE-627)185242995  |0 (DE-576)211809829  |a Abfrageverarbeitung  |2 gnd 
689 0 4 |D s  |0 (DE-588)4123980-5  |0 (DE-627)105751111  |0 (DE-576)209564288  |a Privatsphäre  |2 gnd 
689 0 |5 DE-101 
689 1 0 |D s  |0 (DE-588)7562931-8  |0 (DE-627)526751819  |0 (DE-576)263014703  |a Trusted Computing  |2 gnd 
689 1 1 |D s  |0 (DE-588)7546673-9  |0 (DE-627)51917948X  |0 (DE-576)258364017  |a Identitätsverwaltung  |2 gnd 
689 1 |5 DE-101 
700 1 |a Jajodia, Sushil  |d 1947-  |0 (DE-588)120551683  |0 (DE-627)08074284X  |0 (DE-576)16575902X  |4 oth 
776 1 |z 9783642137389 
776 0 8 |i Buchausg. u.d.T.  |t Data and applications security and privacy XXIV  |d Berlin : Springer, 2010  |h XIII, 376 S.  |w (DE-627)626834805  |w (DE-576)324869940  |z 3642137385  |z 9783642137389 
830 0 |a Lecture notes in computer science  |v 6166  |9 6166  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-13739-6  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://zbmath.org/?q=an:1197.68010  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC  |b 2010 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SCS  |b 2010 
912 |a ZDB-2-SXCS  |b 2010 
912 |a ZDB-2-SEB  |b 2010 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.64  |j Datenbanken  |q SEPA  |0 (DE-627)106410865 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
900 |a Jajodia, S. 
900 |a Sushil Jajodia 
950 |a Access control 
950 |a Zugangskontrolle 
950 |a Computersicherheit 
950 |a Schutz der Privatsphäre 
950 |a Persönlichkeitsrecht 
950 |a 私人领域 
950 |a 私隐 
950 |a 私人領域 
950 |a 私隱 
950 |a Сфера личной жизни 
950 |a Datenbankverwaltungssystem 
950 |a DBMS 
950 |a Datenbankbetriebssystem 
950 |a Datenbank 
950 |a Betriebssystem 
950 |a Datenbankmanagementsystem 
950 |a Data base management system 
950 |a Data base system 
950 |a Datenbanksoftware 
950 |a Datenbankprogramm 
950 |a Programm 
950 |a Система базы данных 
950 |a Datensicherheit 
950 |a Sicherheit 
950 |a Datenverarbeitung 
950 |a Informationssicherheit 
950 |a Softwareschutz 
950 |a Надёжность сохранения данных 
950 |a Anfrageverarbeitung 
950 |a Anfrageausführung 
950 |a Anfragebearbeitung 
950 |a Query processing 
950 |a Abfragesprache 
950 |a Identitätsmanagement 
950 |a Identity Management 
950 |a e-ID 
950 |a Elektronische IdentitätvQuasisynonym 
950 |a Elektronische IdentifikationvQuasisynonym 
950 |a Informationstechnik 
950 |a Vertrauenswürdigkeit 
950 |a Datensicherung 
950 |a Sealed Cloud 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-13739-6  |9 DE-14 
852 |a DE-14  |z 2011-07-20T14:58:12Z  |x epn:3335705971 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-13739-6  |9 DE-15 
852 |a DE-15  |z 2011-05-16T16:33:42Z  |x epn:3335706064 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-13739-6  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |z 2011-01-26T14:25:49Z  |x epn:333570617X 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-13739-6  |9 DE-520 
852 |a DE-520  |z 2010-09-01T15:39:49Z  |x epn:3335706226 
980 |a 165008983X  |b 0  |k 165008983X  |o 329516515 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Data+and+Applications+Security+and+Privacy+XXIV%3A+24th+Annual+IFIP+WG+11.3+Working+Conference%2C+Rome%2C+Italy%2C+June+21-23%2C+2010.+Proceedings&rft.date=2010&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Data+and+Applications+Security+and+Privacy+XXIV%3A+24th+Annual+IFIP+WG+11.3+Working+Conference%2C+Rome%2C+Italy%2C+June+21-23%2C+2010.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+6166&rft.au=Foresti%2C+Sara&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642137393
SOLR
_version_ 1789360378030850048
access_facet Electronic Resources
author Foresti, Sara
author2 Jajodia, Sushil
author2_role oth
author2_variant s j sj
author_facet Foresti, Sara, Jajodia, Sushil
author_role aut
author_sort Foresti, Sara
author_variant s f sf
callnumber-first T - Technology
callnumber-label TK5105
callnumber-raw TK5105.5-5105.9
callnumber-search TK5105.5-5105.9
callnumber-sort TK 45105.5 45105.9
callnumber-subject TK - Electrical and Nuclear Engineering
collection ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
contents Query and Data Privacy -- Generalizing PIR for Practical Private Retrieval of Public Data -- A Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure Outsourcing of DNA Searching via Finite Automata -- A Labelling System for Derived Data Control -- On the Identification of Property Based Generalizations in Microdata Anonymization -- Access Control -- Role Mining in the Presence of Noise -- Distributed and Secure Access Control in P2P Databases -- Constructing Key Assignment Schemes from Chain Partitions -- Data Confidentiality and Query Verification -- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality -- Efficient Inference Control for Open Relational Queries -- Query Racing: Fast Completeness Certification of Query Results -- Policy Definition and Enforcement -- Mining Likely Properties of Access Control Policies via Association Rule Mining -- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control -- Enforcing Request Integrity in Web Applications -- Trust and Identity Management -- Using Trust-Based Information Aggregation for Predicting Security Level of Systems -- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms -- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms -- Short Papers -- An Access Control Model for Web Databases -- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems -- Evaluating the Risk of Adopting RBAC Roles -- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance -- When ABE Meets RSS -- PriMan : A Privacy-Preserving Identity Framework -- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach -- Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach -- A Secure RFID Ticket System for Public Transport -- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols -- Secure Location Verification., This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management.
ctrlnum (DE-627)165008983X, (DE-576)329516515, (DE-599)BSZ329516515, (OCoLC)664679206, (OCoLC)851046642, (ZBM)1197.68010, (DE-He213)978-3-642-13739-6, (EBP)040525937
de15_date 2011-05-16T16:33:42Z
doi_str_mv 10.1007/978-3-642-13739-6
era_facet 2010
facet_912a ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Datensicherung, Zugriffskontrolle, Datenbanksystem, Abfrageverarbeitung, Privatsphäre, Trusted Computing, Identitätsverwaltung
finc_class_facet Informatik, Technik
finc_id_str 0001378863
fincclass_txtF_mv science-computerscience
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2010 Rom (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Rom
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 6166
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-165008983X
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2010
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2010
institution DE-14, DE-Zi4, DE-520, DE-15
is_hierarchy_id 0-165008983X
is_hierarchy_title Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
isbn 9783642137396
isbn_isn_mv 9783642137389, 3642137385
issn_isn_mv 1611-3349
kxp_id_str 165008983X
language English
last_indexed 2024-01-28T18:37:14.206Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Information storage and retrieval systems, Computer networks ., Electronic data processing, Application software., Algorithms., Cryptography., Datensicherung, Zugriffskontrolle, Datenbanksystem, Abfrageverarbeitung, Privatsphäre, Trusted Computing, Identitätsverwaltung
marc024a_ct_mv 10.1007/978-3-642-13739-6
match_str foresti2010dataandapplicationssecurityandprivacyxxiv24thannualifipwg113workingconferenceromeitalyjune21232010proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)6166
names_id_str_mv (DE-588)120551683, (DE-627)08074284X, (DE-576)16575902X
oclc_num 664679206, 851046642
physical Online-Ressource (XIII, 376p. 80 illus, digital)
publishDate 2010
publishDateSort 2010
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 329516515
recordtype marcfinc
rsn_id_str_mv (DE-15)2461976
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 6166
series2 Lecture Notes in Computer Science ; 6166, SpringerLink ; Bücher
source_id 0
spelling Foresti, Sara aut, Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings edited by Sara Foresti, Sushil Jajodia, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (XIII, 376p. 80 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6166, SpringerLink Bücher, Query and Data Privacy -- Generalizing PIR for Practical Private Retrieval of Public Data -- A Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure Outsourcing of DNA Searching via Finite Automata -- A Labelling System for Derived Data Control -- On the Identification of Property Based Generalizations in Microdata Anonymization -- Access Control -- Role Mining in the Presence of Noise -- Distributed and Secure Access Control in P2P Databases -- Constructing Key Assignment Schemes from Chain Partitions -- Data Confidentiality and Query Verification -- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality -- Efficient Inference Control for Open Relational Queries -- Query Racing: Fast Completeness Certification of Query Results -- Policy Definition and Enforcement -- Mining Likely Properties of Access Control Policies via Association Rule Mining -- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control -- Enforcing Request Integrity in Web Applications -- Trust and Identity Management -- Using Trust-Based Information Aggregation for Predicting Security Level of Systems -- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms -- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms -- Short Papers -- An Access Control Model for Web Databases -- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems -- Evaluating the Risk of Adopting RBAC Roles -- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance -- When ABE Meets RSS -- PriMan : A Privacy-Preserving Identity Framework -- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach -- Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach -- A Secure RFID Ticket System for Public Transport -- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols -- Secure Location Verification., This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management., Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Information storage and retrieval systems, Computer networks ., Electronic data processing, Application software., Algorithms., Cryptography., Konferenzschrift 2010 Rom (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4293034-0 (DE-627)104199954 (DE-576)210933003 Zugriffskontrolle gnd, s (DE-588)4113276-2 (DE-627)105830550 (DE-576)209475145 Datenbanksystem gnd, s (DE-588)4378490-2 (DE-627)185242995 (DE-576)211809829 Abfrageverarbeitung gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, DE-101, s (DE-588)7562931-8 (DE-627)526751819 (DE-576)263014703 Trusted Computing gnd, s (DE-588)7546673-9 (DE-627)51917948X (DE-576)258364017 Identitätsverwaltung gnd, Jajodia, Sushil 1947- (DE-588)120551683 (DE-627)08074284X (DE-576)16575902X oth, 9783642137389, Buchausg. u.d.T. Data and applications security and privacy XXIV Berlin : Springer, 2010 XIII, 376 S. (DE-627)626834805 (DE-576)324869940 3642137385 9783642137389, Lecture notes in computer science 6166 6166 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-13739-6 X:SPRINGER Verlag lizenzpflichtig Volltext, https://zbmath.org/?q=an:1197.68010 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-13739-6 DE-14, DE-14 2011-07-20T14:58:12Z epn:3335705971, http://dx.doi.org/10.1007/978-3-642-13739-6 DE-15, DE-15 2011-05-16T16:33:42Z epn:3335706064, http://dx.doi.org/10.1007/978-3-642-13739-6 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:25:49Z epn:333570617X, http://dx.doi.org/10.1007/978-3-642-13739-6 DE-520, DE-520 2010-09-01T15:39:49Z epn:3335706226
spellingShingle Foresti, Sara, Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings, Lecture notes in computer science, 6166, Query and Data Privacy -- Generalizing PIR for Practical Private Retrieval of Public Data -- A Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure Outsourcing of DNA Searching via Finite Automata -- A Labelling System for Derived Data Control -- On the Identification of Property Based Generalizations in Microdata Anonymization -- Access Control -- Role Mining in the Presence of Noise -- Distributed and Secure Access Control in P2P Databases -- Constructing Key Assignment Schemes from Chain Partitions -- Data Confidentiality and Query Verification -- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality -- Efficient Inference Control for Open Relational Queries -- Query Racing: Fast Completeness Certification of Query Results -- Policy Definition and Enforcement -- Mining Likely Properties of Access Control Policies via Association Rule Mining -- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control -- Enforcing Request Integrity in Web Applications -- Trust and Identity Management -- Using Trust-Based Information Aggregation for Predicting Security Level of Systems -- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms -- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms -- Short Papers -- An Access Control Model for Web Databases -- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems -- Evaluating the Risk of Adopting RBAC Roles -- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance -- When ABE Meets RSS -- PriMan : A Privacy-Preserving Identity Framework -- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach -- Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach -- A Secure RFID Ticket System for Public Transport -- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols -- Secure Location Verification., This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management., Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Information storage and retrieval systems, Computer networks ., Electronic data processing, Application software., Algorithms., Cryptography., Konferenzschrift 2010 Rom, Datensicherung, Zugriffskontrolle, Datenbanksystem, Abfrageverarbeitung, Privatsphäre, Trusted Computing, Identitätsverwaltung
swb_id_str 329516515
title Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
title_auth Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
title_full Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings edited by Sara Foresti, Sushil Jajodia
title_fullStr Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings edited by Sara Foresti, Sushil Jajodia
title_full_unstemmed Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings edited by Sara Foresti, Sushil Jajodia
title_in_hierarchy 6166. Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings (2010)
title_short Data and Applications Security and Privacy XXIV
title_sort data and applications security and privacy xxiv 24th annual ifip wg 11 3 working conference rome italy june 21 23 2010 proceedings
title_sub 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
title_unstemmed Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
topic Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Information storage and retrieval systems, Computer networks ., Electronic data processing, Application software., Algorithms., Cryptography., Konferenzschrift 2010 Rom, Datensicherung, Zugriffskontrolle, Datenbanksystem, Abfrageverarbeitung, Privatsphäre, Trusted Computing, Identitätsverwaltung
topic_facet Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Information storage and retrieval systems, Computer networks ., Electronic data processing, Application software., Algorithms., Cryptography., Konferenzschrift, Datensicherung, Zugriffskontrolle, Datenbanksystem, Abfrageverarbeitung, Privatsphäre, Trusted Computing, Identitätsverwaltung
url https://doi.org/10.1007/978-3-642-13739-6, https://zbmath.org/?q=an:1197.68010, http://dx.doi.org/10.1007/978-3-642-13739-6