close
1.

電子ブック

EB
Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Takeo Kanade, Roger King, Dennis McLeod, Maria E. Orlowska, S. Spaccapietra, Leon Strous, Roger B. King
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
International Conference on Ontologies, DataBases, and Applications of Semantics for Large Scale Information Systems (ODBase 2003)
Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases / Raphael Volz ; Steffen Staab ; Boris Motik
Ontology Translation on the Semantic Web / Dejing Dou ; Drew McDermott ; Peishen Qi
Compound Term Composition Algebra: The Semantics / Yannis Tzitzikas ; Anastasia Analyti ; Nicolas Spyratos
Dynamic Pattern Mining: An Incremental Data Clustering Approach / Seokkyung Chung ; Dennis McLeod
International Conference on Cooperative Information Systems (CoopIS 2003)
A Knowledge Network Approach for Implementing Active Virtual Marketplaces / Minsoo Lee ; Stanley Y.W. Su ; Herman Lam
Stream Integration Techniques for Grid Monitoring / Andy Cooke ; Alasdair J.G. Gray ; Werner Nutt
6th IFIP TC 11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS 2003)
Information Release Control: A Learning-Based Architecture / Claudio Bettini ; X. Sean Wang ; Sushil Jajodia
Enforcing Semantics-Aware Security in Multimedia Surveillance / Naren Kodali ; Csilla Farkas ; Duminda Wijesekera
Author Index
International Conference on Ontologies, DataBases, and Applications of Semantics for Large Scale Information Systems (ODBase 2003)
Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases / Raphael Volz ; Steffen Staab ; Boris Motik
Ontology Translation on the Semantic Web / Dejing Dou ; Drew McDermott ; Peishen Qi
2.

電子ブック

EB
Sushil Jajodia, Takeo Kanade, Javier Lopez, Javier L?pez
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
3.

電子ブック

EB
Claudio Bettini, Sushil Jajodia, Takeo Kanade, Pierangela Samarati, X. Sean Wang
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Anonymity and Historical-Anonymity in Location-Based Services / Claudio Bettini ; Sergio Mascetti ; X. Sean Wang ; Dario Freni ; Sushil Jajodia
Location Privacy Techniques in Client-Server Architectures / Christian S. Jensen ; Hua Lu ; Man Lung Yiu
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services / Ali Khoshgozaran ; Cyrus Shahabi
Privacy Preservation over Untrusted Mobile Networks / Claudio A. Ardagna ; Pierangela Samarati ; Angelos Stavrou
Access Control in Location-Based Services / Marco Cremonini ; Sabrina De Capitani di Vimercati
Location Privacy in RFID Applications / Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Privacy in Georeferenced Context-Aware Services: A Survey / Daniele Riboni ; Linda Pareschi
Safety and Privacy in Vehicular Communications / Josep Domingo-Ferrer ; Qianhong Wu
Privacy Preserving Publication of Moving Object Data / Francesco Bonchi
Author Index
Anonymity and Historical-Anonymity in Location-Based Services / Claudio Bettini ; Sergio Mascetti ; X. Sean Wang ; Dario Freni ; Sushil Jajodia
Location Privacy Techniques in Client-Server Architectures / Christian S. Jensen ; Hua Lu ; Man Lung Yiu
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services / Ali Khoshgozaran ; Cyrus Shahabi
4.

電子ブック

EB
Anoop Singhal, Sushil Jajodia
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Preface
An Overview of Data Warehouse, OLAP and Data Mining Technology
Network and System Security
Intrusion Detection Systems
Data Mining for Intrusion Detection
Data Modeling and Data Warehousing Techniques to Improve Intrusion Detection
MINDS - Architecture and Design
Discovering Novel Attack Strategies from INFOSEC Alerts
Index
Preface
An Overview of Data Warehouse, OLAP and Data Mining Technology
Network and System Security
5.

電子ブック

EB
Mihai; Jha, Somesh; Maughan, Douglas Christodorescu, Mihai Christodorescu, Sushil Jajodia
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Overview / Part I:
Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 / Brian Witten ; Carey Nachenberg1:
Software Analysis and Assurance / Part II:
Static Disassembly and Code Analysis / Giovanni Vigna2:
A Next-Generation Platform for Analyzing Executables / Thomas Reps ; Gogul Balakrishnan ; Junghee Lim ; Tim Teitelbaum3:
Behavioral and Structural Properties of Malicious Code / Christopher Kruegel4:
Detection and Prevention of SQL Injection Attacks / William G.J. Halfond ; Alessandro Orso5:
Distributed Threat Detection and Defense / Part III:
Very Fast Containment of Scanning Worms, Revisited / Nicholas Weaver ; Stuart Staniford ; Vern Paxson6:
Sting: An End-to-End Self-Healing System for Defending against Internet Worms / David Brumley ; James Newsome ; Dawn Song7:
An Inside Look at Botnets / Paul Barford ; Vinod Yegneswaran8:
Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy? / Mihai Christodorescu ; Shai Rubin9:
Stealthy and Targeted Threat Detection and Defense / Part IV:
Composite Hybrid Techniques For Defending Against Targeted Attacks / Stelios Sidiroglou ; Angelos D. Keromytis10:
Towards Stealthy Malware Detection / Salvatore J. Stolfo ; Ke Wang ; Wei-Jen Li11:
Novel Techniques for Constructing Trustworthy Services / Part V:
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems / Arvind Seshadri ; Mark Luk ; Adrian Perrig ; Leendert van Doorn ; Pradeep Khosla12:
Principles of Secure Information Flow Analysis / Geoffrey Smith13:
Index
Overview / Part I:
Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 / Brian Witten ; Carey Nachenberg1:
Software Analysis and Assurance / Part II:
6.

電子ブック

EB
Douglas W. Frye, Sushil Jajodia
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Table of Contents
List of Figures
Preface
Acknowledgments and Dedication
Information Technology and its Role In the Modern Organization / Chapter 1:
The Extent of an Organization's Connectivity / Chapter 2:
Network Physical Components / Chapter 3:
Legitimate Network Access / Chapter 4:
Illegitimate Network Access / Chapter 5:
Encryption / Chapter 6:
Balanced Scorecard / Chapter 7:
Sarbanes-Oxley / Chapter 8:
Physical Security / Chapter 9:
Disaster Recovery / Chapter 10:
Initial Employee Communication / Chapter 11:
The Human Element / Chapter 12:
Email, Instant Messaging and Phishing / Chapter 13:
Network Administration / Chapter 14:
Network Monitoring / Chapter 15:
Executive Communication / Chapter 16:
Information Security Awareness / Chapter 17:
Synthesis and Conclusion / Chapter 18:
Draft Policies / Chapter 19:
Bibliography
Index
Table of Contents
List of Figures
Preface
7.

電子ブック

EB
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Background / 1.1:
Problem Statement / 1.2:
Overview / 1.3:
Overview of Basic Concepts / 1.3.1:
Adapting Previous Approaches to Data Cubes / 1.3.2:
A Lattice-based Solution / 1.3.3:
OLAP and Data Cubes / 2:
OLAP / 2.1:
Data Cube / 2.2:
Inference Control in Statistical Databases / 3:
Query Set Size Control and Trackers / 3.1:
The Star Query Model / 3.2:
Key-Specified Queries / 3.3:
Linear System Attack and Audit Expert / 3.4:
Intractbility of Inference Control / 3.5:
Inferences in Data Cubes / 4:
Preliminaries / 4.1:
Arbitrary Range Queries / 4.3:
Restricted Range Queries / 4.4:
Even Range Query Attack / 4.4.1:
Indirect Even Range Query Attack / 4.4.2:
Skeleton Query Attack / 4.4.3:
Conclusion / 4.5:
Cardinality-based Inference Control / 5:
Compromisability / 5.1:
Formalization Rationale / 5.2.3:
Cardinality-based Sufficient Conditions / 5.3:
Trivial Compromisability / 5.3.1:
Non-trivial Compromisability / 5.3.2:
A Three-Tier Inference Control Model / 5.4:
Cardinality-based Inference Control for Data Cubes / 5.5:
Inference Control Algorithm / 5.5.1:
Correctness and Time Complexity / 5.5.2:
Implementation Issues / 5.5.3:
Integrating Inference Control into OLAP / 5.5.3.1:
Re-ordering Tuples in Unordered Dimensions / 5.5.3.2:
Update Operations / 5.5.3.3:
Aggregation Operators Other Than Sum / 5.5.3.4:
Conclusions / 5.6:
Parity-based Inference Control for Range Queries / 6:
Motivating Examples / 6.1:
Definitions / 6.2.2:
Applying Existing Methods to MDR Queries / 6.3:
Query Set Size Control, Overlap Size Control and Audit Expert / 6.3.1:
Finding Maximal Safe Subsets of Unsafe MDR Queries / 6.3.2:
Parity-Based Inference Control / 6.4:
Even MDR Queries / 6.4.1:
Characterizing the QDT Graph / 6.4.2:
Beyond Even MDR Queries / 6.4.3:
Unsafe Even MDR Queries / 6.4.4:
Discussion / 6.5:
Lattice-based Inference Control in Data Cubes / 6.6:
The Basic Model / 7.1:
Specifying Authorization Objects in Data Cubes / 7.3:
Controlling Inferences in Data Cubes / 7.4:
Preventing Multi-Dimensional Inferences / 7.4.1:
Assumptions / 7.4.2.1:
A Special Case / 7.4.2.2:
The General Case / 7.4.2.3:
Eliminating One-Dimensional Inferences / 7.4.3:
Implementation Options and Complexity / 7.5:
Summary / 7.6:
Query-driven Inference Control in Data Cubes / 8:
Authorization Objects and Queries in Data Cubes / 8.1:
The Static Approach and Its Impact on Availability / 8.3:
Query-Driven Prevention of Multi-Dimensional Inferences / 8.4:
Authorizing Queries / 8.4.1:
Complexity Analysis / 8.4.4:
Conclusion and Future Direction / 8.5:
References
Index
Introduction / 1:
Background / 1.1:
Problem Statement / 1.2:
8.

電子ブック

EB
Ting; Jajodia, Sushil Yu, Sushil Jajodia, Ting Yu
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Preface
Foundation / Part I:
Basic Security Concepts / Sushil Jajodia ; Ting Yu
Access Control Policies and Languages in Open Environments / S. De Capitani di Vimercati ; S. Foresti ; S. Jajodia ; P. Samarati
Trusted Recovery / Meng Yu ; Peng Liu ; Wanyu Zang
Access Control for Semi-Structured Data / Part II:
Access Control Policy Models for XML / Michiharu Kudo ; Naizhen Qi
Optimizing Tree Pattern Queries over Secure XML Databases / Hui Wang ; Divesh Srivastava ; Laks V.S. Lakshmanan ; SungRan Cho ; Sihem Amer-Yahia
Distributed Trust Management / Part III:
Rule-based Policy Specification / Grigoris Antoniou ; Matteo Baldoni ; Piero A. Bonatti ; Wolfgang Nejdl ; Daniel Olmedilla
Automated Trust Negotiation in Open Systems / Adam J. Lee ; Kent E. Seamons ; Marianne Winslett
Building Trust and Security in Peer-to-Peer Systems / Terry Bearly ; Vijay Kumar
Privacy in Cross-Domain Information Sharing / Part IV:
Microdata Protection / V. Ciriani
k-Anonymity / S. Foresti, P. Samarati
Preserving Privacy in On-line Analytical Processing Data Cubes / Lingyu Wang ; Duminda Wijesekera
Security in Emerging Data Services / Part V:
Search on Encrypted Data / Hakan Hacigumus ; Bijit Hore ; Bala Iyer ; Sharad Mehrotra
Rights Assessment for Relational Data Radu Sion
Index
Preface
Foundation / Part I:
Basic Security Concepts / Sushil Jajodia ; Ting Yu
9.

電子ブック

EB
Donggang Liu, Sushil Jajodia, Peng Ning
出版情報: Springer eBooks Computer Science , Springer US, 2007
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
Security Issues in Sensor Networks / 1.3:
Broadcast Authentication / 1.3.1:
Pairwise Key Establishment / 1.3.2:
Security in Localization / 1.3.3:
Orgnization of the Book / 1.4:
[mu]TESLA Broadcast Authentication / 2:
Multi-Level [mu]TESLA / 2.2:
Scheme I: Predetermined Key Chain Commitment / 2.2.1:
Scheme II: Naive Two-Level [mu]TESLA / 2.2.2:
Scheme III: Fault Tolerant Two-Level [mu]TESLA / 2.2.3:
Scheme IV: DOS-Tolerant Two-Level [mu]TESLA / 2.2.4:
Scheme V: DOS-Resistant Two-Level [mu]TESLA / 2.2.5:
Scheme VI: Multi-Level [mu]TESLA / 2.2.6:
Experimental Results / 2.2.7:
Tree-Based [mu]TESLA / 2.3:
The Basic Approach / 2.3.1:
A Scheme for Long-Lived Senders / 2.3.2:
Distributing Parameter Certificates / 2.3.3:
Revoking [mu]TESLA Instances / 2.3.4:
Implementation and Evaluation / 2.3.5:
Summary / 2.4:
Key Pre-Distribution Techniques in Sensor Networks / 3:
Polynomial-Based Key Pre-Distribution / 3.1.1:
Probabilistic Key Pre-Distribution / 3.1.2:
Polynomial Pool-Based Key Pre-Distribution / 3.2:
Phase 1: Setup / 3.2.1:
Phase 2: Direct Key Establishment / 3.2.2:
Phase 3: Path Key Establishment / 3.2.3:
Key Pre-Distribution Using Random Subset Assignment / 3.3:
The Random Subset Assignment Scheme / 3.3.1:
Performance / 3.3.2:
Overheads / 3.3.3:
Security Analysis / 3.3.4:
Comparison with Previous Schemes / 3.3.5:
Hypercube-based Key Pre-Distribution / 3.4:
The Hypercube-Based Scheme / 3.4.1:
Dynamic Key Path Discovery / 3.4.2:
Overhead / 3.4.3:
Optimization of Polynomial Evaluation / 3.4.5:
Evaluation / 3.5.2:
Improving Pairwise Key Establishment Using Deployment Knowledge / 3.6:
Improving Key Pre-Distribution with Prior Deployment Knowledge / 4.1:
A Location-Aware Deployment Model / 4.1.1:
Closest Pairwise Keys Scheme / 4.1.2:
Closest Polynomials Pre-Distribution Scheme / 4.1.3:
Improving Key Pre-Distribution with Post Deployment Knowledge / 4.2:
Key Prioritization Using Post Deployment Knowledge / 4.2.1:
Improving Random Subset Assignment Scheme with Deployment Locations / 4.2.2:
Improving Key Pre-Distribution with Group Deployment Knowledge / 4.3:
Group-Based Deployment Model / 4.3.1:
A General Framework / 4.3.2:
Performance Analysis / 4.3.3:
Secure Localization / 4.3.4:
Localization in Sensor Networks / 5.1:
Pitfalls of Current Localization Schemes under Attacks / 5.2:
Attack-Resistant Location Estimation / 5.3:
Assumptions / 5.3.1:
Attack-Resistant Minimum Mean Square Estimation (MMSE) / 5.3.2:
Voting-Based Location Estimation / 5.3.3:
Simulation Evaluation / 5.3.4:
Implementation and Field Experiments / 5.3.6:
A Detector for Malicious Beacon Nodes / 5.4:
Detecting Malicious Beacon Signals / 5.4.1:
Filtering Replayed Beacon Signals / 5.4.2:
Revoking Malicious Beacon Nodes / 5.4.3:
Summary and Future Work / 5.4.4:
Future Work / 6.1:
References
Index
Introduction / 1:
Wireless Sensor Network / 1.1:
Design Challenges / 1.2:
10.

電子ブック

EB
Sushil Jajodia, David Dagon, Wenke Lee, Cliff Wang
出版情報: Springer eBooks Computer Science , Springer US, 2008
所蔵情報: loading…
目次情報: 続きを見る
Botnet Detection Based on Network Behavior / W. Timothy Strayer ; David Lapsely ; Robert Walsh ; Carl Livadas
Honeynet-based Botnet Scan Traffic Analysis / Zhichun Li ; Anup Goyal ; Yan Chen
Characterizing Bots' Remote Control Behavior / Elizabeth Stinson ; John C. Mitchell
Automatically Identifying Trigger-based Behavior in Malware / David Brumley ; Cody Hartwig ; Zhenkai Liang ; James Newsome ; Dawn Song ; Heng Yin
Towards Sound Detection of Virtual Machines / Jason Franklin ; Mark Luk ; Jonathan M. McCune ; Arvind Seshadri ; Adrian Perrig ; Leendert van Doorn
Botnets and Proactive System Defense / John Bambenek ; Agnes Klus
Detecting Botnet Membership with DNSBL Counterintelligence / Anirudh Ramachandran ; Nick Feamster ; David Dagon
A Taxonomy of Botnet Structures / Guofei Gu ; Christopher P. Lee
Botnet Detection Based on Network Behavior / W. Timothy Strayer ; David Lapsely ; Robert Walsh ; Carl Livadas
Honeynet-based Botnet Scan Traffic Analysis / Zhichun Li ; Anup Goyal ; Yan Chen
Characterizing Bots' Remote Control Behavior / Elizabeth Stinson ; John C. Mitchell
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼