TC113_logo 

20th Annual IFIP WG 11.3 Working Conference on

Data and Applications Security

SAP Labs, Sophia Antipolis, France
July 31-August 2, 2006

http://cimic.rutgers.edu/ifip113/2006/

 

>>  ACCEPTED PAPERS

General

- HOME
- News
-
IFIP WG 11.3
- IFIP TC 11

Contributions

- Call for Papers
- Important Dates
- Manuscript Instructions
-
Paper Submission

Programs 

Accepted Papers
Camera-ready Submission
Final Program

Organization

Conference Officers
Program Committees
Contacts

Participation

Registration
Participants Info
Accommodation
About Sophia Antipolis
Travel Guidelines

 

 

 

  Accepted  Papers

 

107

Creating Objects in the Flexible Authorization Framework
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera

109

Information Theoretical Analysis of Two-Party Secret Computation
Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu

 

114

On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
Joachim Biskup, Lena Wiese

116

Consolidating the Access Control of  Composite Applications and Workflows
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz

120

Authenticating Mutli-Dimensional Query Results in Data Publishing
Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan

121

XML Streams Watermarking
Julien Lafaye, David Gross-Amblard

 

122

Aggregation Queries in the Database-As-a-Service Model
Einar Mykletun, Gene Tsudik

124

Policy Classes and Query Rewriting Algorithm for XML Security Views
Nataliya Rassadko, Gabriel Kuper, Fabio Massacci

 

126

Interactive Analysis of Attack Graphs Using Relational
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia

127

Notarized Federated Identity Management for Web Services
Michael Goodrich, Roberto Tamassia, Danfeng Yao

130

Resolving Information Flow Conflicts in RBAC Systems
Noa Tuval, ehud gudes

136

Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
Saket Kaushik, William Winsborough, Duminda Wijesekera, Paul Ammann

 

139

Term Rewriting for Access Control
Steve Barker, Maribel Fernandez

 

142

Discretionary and Mandatory Controls for Role-Based Administration
Jason Crampton

 

143

A Distributed Coalition Service Registry for Ad-hoc Dynamic Coalitions: A Service-oriented Approach
Ravi Mukkamala, Vijay Atluri, Janice Warner, Ranjit Abbadasari

 

147

Enhancing User Privacy Through Data Handling Policies
Claudio Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati

 

151

Efficient Enforcement of Security Policies based on Tracking of Mobile Users
Vijay Atluri, Heechang Shin

 

153

A Framework for Flexible Access Control in Digital Library Systems
Indrajit Ray, Sudip Chakraborty

155

AUTHRULE: A GENERIC RULE-BASED AUTHORIZATION MODULE
Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe
 

160

Aspect-Oriented Risk Driven Development of Secure Applications
Geri Georg, Siv Hilde Houmb, and Indrakshi Ray

161

From Business Process Choreography to Authorization Policies
Philip Robinson
, Florian Kerschbaum1, and Andreas Schaad

167

Detection and Resolution of Anomalies in Firewall Policy Rules
Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham