第一图书网

Data and Applications Security XX数据与应用安全 XX

Ernesto Damiani 1 (2006年8月29日)
出版时间:

2006-8  

出版社:

1 (2006年8月29日)  

作者:

Ernesto Damiani  

页数:

317  

内容概要

he LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community,with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available. The scope of LNCS, including its subseries LNAI and LNBI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes -proceedings (published in time for the respective conference) -post-proceedings (consisting of thoroughly revised final full papers) -research monographs (which may be based on outstanding PhD work,research projects, technical reports, etc.)

书籍目录

Creating Objects in the Flexible Authorization FrameworkDetection and Resolution of Anomalies in Firewall Policy RulesOn Finding an Inference-Proof Complete Database for Controlled Query EvaluationConsolidating the Access Control of Composite Applications and Workflows Authenticating Multi-dimensional Query Results in Data PublishingXML Streams WatermarkingAggregation Queries in the Database-As-a-Service ModelPolicy Classes and Query Rewriting Algorithm for XML Security ViewsInteractive Analysis of Attack Graphs Using Relational QueriesNotarized Federated Identity Management for Web ServicesResolving Information Flow Conflicts in RBAC SystemsPolicy Transformations for Preventing Leakage of Sensitive Information in Email SystemsTerm Rewriting for Access ControlDiscretionary and Mandatory Controls for Role-Based AdministrationA Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented ApproachEnhancing User Privacy Through Data Handling PoliciesEfficient Enforcement of Security Policies Based on Tracking of Mobile UsersA Framework for Flexible Access Control in Digital Library SystemsAuthrule: A Generic Rule-Based Authorization ModuleAspect-Oriented Risk Driven Development of Secure ApplicationsFrom Business Process Choreography to Authorization PoliciesInformation Theoretical Analysis of Two-Party Secret ComputationAuthor Index


图书封面

广告

下载页面


Data and Applications Security XX数据与应用安全 XX PDF格式下载



相关图书