close
1.

図書

図書
Elisa Bertino (ed.)
出版情報: Berlin : Springer, c2000  xiii, 491 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1850
所蔵情報: loading…
2.

図書

図書
Elisa Bertino ... [et al.], (eds.)
出版情報: Berlin : Springer, c1996  x, 364 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1146
所蔵情報: loading…
3.

図書

図書
Elisa Bertino, Susan Urban (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1994  x, 386 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 858
所蔵情報: loading…
4.

図書

図書
edited by Elisa Bertino, M. Tamer Özsu
出版情報: Boston : Kluwer Academic Publishers, 1994  126 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Guest Editors' Introduction / E. Bertino ; M. Tamer +szu
A Nonrestrictive Concurrency Control Protocol for Object-Oriented Databases / D. Agrawal ; A. El Abbadi
Concurrent Behavior: a Construct to Specify the External Behavior of Objects in Object Databases / N. De Francesco ; G. Vaglini
Performance Analysis of Parallel Object-Oriented Query Processing Algorithms / A.K. Thakore ; S.Y.W. Su
Schema Evolution and Integration / S.M. Clamen
Guest Editors' Introduction / E. Bertino ; M. Tamer +szu
A Nonrestrictive Concurrency Control Protocol for Object-Oriented Databases / D. Agrawal ; A. El Abbadi
Concurrent Behavior: a Construct to Specify the External Behavior of Objects in Object Databases / N. De Francesco ; G. Vaglini
5.

電子ブック

EB
Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Takeo Kanade, Roger King, Dennis McLeod, Maria E. Orlowska, S. Spaccapietra, Leon Strous, Roger B. King
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
International Conference on Ontologies, DataBases, and Applications of Semantics for Large Scale Information Systems (ODBase 2003)
Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases / Raphael Volz ; Steffen Staab ; Boris Motik
Ontology Translation on the Semantic Web / Dejing Dou ; Drew McDermott ; Peishen Qi
Compound Term Composition Algebra: The Semantics / Yannis Tzitzikas ; Anastasia Analyti ; Nicolas Spyratos
Dynamic Pattern Mining: An Incremental Data Clustering Approach / Seokkyung Chung ; Dennis McLeod
International Conference on Cooperative Information Systems (CoopIS 2003)
A Knowledge Network Approach for Implementing Active Virtual Marketplaces / Minsoo Lee ; Stanley Y.W. Su ; Herman Lam
Stream Integration Techniques for Grid Monitoring / Andy Cooke ; Alasdair J.G. Gray ; Werner Nutt
6th IFIP TC 11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS 2003)
Information Release Control: A Learning-Based Architecture / Claudio Bettini ; X. Sean Wang ; Sushil Jajodia
Enforcing Semantics-Aware Security in Multimedia Surveillance / Naren Kodali ; Csilla Farkas ; Duminda Wijesekera
Author Index
International Conference on Ontologies, DataBases, and Applications of Semantics for Large Scale Information Systems (ODBase 2003)
Incrementally Maintaining Materializations of Ontologies Stored in Logic Databases / Raphael Volz ; Steffen Staab ; Boris Motik
Ontology Translation on the Semantic Web / Dejing Dou ; Drew McDermott ; Peishen Qi
6.

電子ブック

EB
Yanchun Zhang, Elisa Bertino, Guandong Xu, Ge Yu
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
7.

電子ブック

EB
Elena Ferrari, Elisa Bertino, Yuecel Karabulut, Ninghui Li
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
8.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Elisa Bertino, James B. D. Joshi
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Invited Short Papers
A Distributed Collaborative Filtering Recommendation Model for P2P Networks / Jun Wang ; Jian Peng ; Xiaoyang Cao
Access Control for Cooperation Systems Based on Group Situation / Minsoo Kim ; James B.D. Joshi ; Minkoo Kim
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites / Jiang Wang ; Anup Ghosh ; Yih Huang
CalSWIM: A Wiki-Based Data Sharing Platform / Yasser Ganjisaffar ; Sara Javanmardi ; Stanley Grant ; Cristina Videira Lopes
Examining a Bayesian Approach to Personalizing Context Awareness in Ubiquitous Computing Environments / Yaser Mowafi ; Dongsong Zhang ; Guisseppi Fogionne
Invited Pull Papers
Smart Homes for All: Collaborating Services in a for-AU Architecture for Domotics / Tiziana Catarci ; Febo Cincotti ; Massimiliano de Leoni ; Massimo Mecella ; Giuseppe Santucci
Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education / Renato J. Figueiredo ; P. Oscar Boykin ; Joée A.B. Fortes ; Tao Li ; Jie-Kwon Peir ; David Wolinsky ; Lizy K. John ; David R. Kaeli ; David J. Lilja ; Sally A. McKee ; Gokhan Memik ; Alain Roy ; Gary S. Tyson
Collaborative Search and User Privacy: How Can They Be Reconciled / Thorben Burghardt ; Erik Buchmann ; Klemens Böhm ; Chris Clifton
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering / Fengjun Li ; Bo Luo ; Peng Liu ; Anna C. Squicciarini ; Dongwon Lee ; Chao-Hsien Chu
Incentive and Trust Issues in Assured Information Sharing / Ryan Layfield ; Mural Kantarcioglu ; Bhavani Thuraisingham
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access / Barbara Carminati ; Elena Ferrari ; Andrea Perego
Evaluating Security Policies in Pervasive Mobile Environments Using Context Information / Carlos Sánchez ; Le Gruenwald ; Mauricio Sánchez
Towards Continuous Workflow Enactment Systems / Panayiotis Neophytou ; Panos K. Chrysanthis ; Alexandros Labrinidis
The RiverFish Approach to Business Process Modeling: Linking Business Steps to Control-Flow Patterns / Devanir Zuliane ; Marcio K. Oikawa ; Simon Malkowski ; José Perez Alcazar ; João Eduardo Ferreira
A Federated Digital Identity Management Approach for Business processes / Elisa Bertino ; Rodolfo Ferrini ; Andrea Musci ; Federica Pad ; Kevin J. Steuer
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments / Tuan Phan ; Danfeng (Daphne) Yao
Collaborative Attack vs. Collaborative Defense (Extended Abstract) / Shouhuai Xu
Learning Models of the Negotiation Partner in Spatio-temporal Collaboration / Yi Luo ; Ladislau Bölöni
Full Papers
Protecting Sensitive Information in Directory Services Using Virtual Directories / William Claycomb ; Dongwan Shin
TeleEye: An Awareness Widget for Providing the Focus of Attention in Collaborative Editing Systems / Mauro C. Pichiliani ; Celso M. Hirata ; Fabricio S. Soares ; Carlos H.Q. Forster
Informa: An Extensible Framework for Group Response Systems / Matthias Hauswirth
Secure and Conditional Resource Coordination for Successful Collaborations / Dongxi Liu ; Surya Nepal ; David Moreland ; Shiping Chen ; Chen Wang ; John Zic
RiBAC: Role Interaction Based Access Control Model for Community Computing / Youna Jung ; Amirreza Masoumzadeh
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments / Isabel F. Cruz ; Rigel Gjomemo ; Benjamin Lin ; Mirko Orsini
Access Control Model for Sharing Composite Electronic Health Records / Jing Jin ; Gail-Joon Ahn ; Michael J. Covington ; Xinwen Zhang
Employing Sink Mobility to Extend the Lifetime of Wireless Sensor Networks / Viplavi Donepudi ; Mohamed Younis
Avoiding Greediness in Cooperative Peer-to-Peer Networks / Matthias R. Brust ; Carlos H.C. Ribeiro ; Jaruwan Mesit
The Data Interoperability Problem as an Exemplary Case Study in the Development of Software Collaboration Environments / Arturo J. Sánchez-Ruíz ; Karthikeyan Umapathy ; Jonathan Beckham ; Patrick Welsh
Towards a Framework for Evolvable Network Design / Hoda Hassan ; Ramy Eltarras ; Mohamed Eltoweissy
A Comprehensive Comparison of Trust Management Systems for Federation / Zhengping Wu
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme / Fengying Li ; Qingshui Xue ; Jiping Zhang ; Zhenfu Cao
A UniBed Theory of Trust and Collaboration / Guoray Cai ; Anna Squicciarini
Enabling Interoperable and Selective Data Sharing among Social Networking Sites / Rodrigo Lopes
Evaluating the Trustworthiness of Contributors in a Collaborative Environment / Cam Tu Phan Le ; Frédéric Cuppens ; Nora Cuppens ; Patrick Maillé
Supporting Agile Development of Authorization Rules for SME Applications / Steffen Bartsch ; Karsten Sohr ; Carsten Bormann
The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks / Jack L. Burbank ; William T.M. Kasch
GroupBanter: Supporting Serendipitous Group Conversations with IM / Kori Inkpen ; Steve Whittaker ; Mary Czerwinski ; Roland Fernandez ; James Wallace
The Effect of Personality on Collaborative Task Performance and Interaction / Sinéad Mc Givney ; Alan F. Smeaton ; Hyozuon Lee
Replication in Overlay Networks: A Multi-objective Optimization Approach / Osama Al-Haj Hassan ; Lakshmish Ramaswamy ; John Miller ; Khaled Rasheed ; E. Rodney Canfield
An Undo Framework for P2P Collaborative Editing / Stéphane Weiss ; Pascal Urso ; Pascal Molli
A Contract Language for Service-Oriented Dynamic Collaborations
Monitoring Contract Enforcement within Virtual Organizations / Federica Paci
Using Epidemic Hoarding to Minimize Load Delays in P2P Distributed Virtual Environments / Ingo Scholtes ; Jean Botev ; Markus Esch ; Hermann Schloss ; Peter Sturm
A Battery-Aware Algorithm for Supporting Collaborative Applications / Sami Rollins ; Cheryl Chang-Yit
Collaborative Graphic Rendering for Improving Visual Experience / Xiaoxin Wu ; Guodong Pei
Analytics and Management of Collaborative Intranets / Peter Géczy ; Noriaki Izumi ; Shotaro Akaho ; Koiti Hasida
Mashup Model and Verification Using Mashup Processing Network / Ehtesham Zahoor ; Olivier Perrin ; Claude Godart
Automatic Categorization of Tags in Collaborative Environments / Qihua Wang ; Hongxia Jin ; Stefan Nusser
A New Method for Creating Efficient Security Policies in Virtual Private Network / Mohammad Mehdi Gilanian Sadeghi ; Borhanuddin Mohd Ali ; Hossein Pedram ; Mehdi Deghan ; Masoud Sabaei
Data Quality and Failures Characterization of Sensing Data in Environmental Applications / Kewei Sha ; Guoxing Zhan ; Safwan Al-Omari ; Tim Calappi ; Weisong Shi ; Carol Miller
Security through Collaboration in MANETs / Wenjia Li ; James Parker ; Anupam Joshi
A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks / Korpom Panyim ; Prashant Krishnamurthy
Location-Based Mapping Services to Support Collaboration in Spatially Distributed Workgroups / Eike Michael Meyer ; Daniel Wichmann ; Henning Büsch ; Susanne Boll
Serial vs. Concurrent Scheduling of Transmission and Processing Tasks in Collaborative Systems / Sasa Junuzovic ; Prasun Dewan
Ontology Support for Managing Top-Down Changes in Composite Services / Xumin Liu ; Athman Bouguettaya
Trusted Translation Services / Yacine Atif ; Mohamed Adel Serhani ; Piers Campbell ; Sujith Samuel Mathew
Enabling Meetings for "Anywhere and Anytime" / Alison Lee ; Umesh Chdndra
Collaboratively Sharing Scientific Data / Fusheng Wang ; Cristobal Vergara-Niedermayr
IT Incident Management as a Collaborative Process: A Visualization Tool Inspired to Social Networks / Claudio Bartolini
Author Index
Invited Short Papers
A Distributed Collaborative Filtering Recommendation Model for P2P Networks / Jun Wang ; Jian Peng ; Xiaoyang Cao
Access Control for Cooperation Systems Based on Group Situation / Minsoo Kim ; James B.D. Joshi ; Minkoo Kim
9.

電子ブック

EB
Elisa Bertino, Elisa Bertino, Lorenzo Martino
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Security for Web Services and Security Goals / 1.1:
Privacy / 1.2:
Goals and Scope of the Book and its Intended Audience / 1.3:
An Overview of the Book's Content / 1.4:
Web Service Technologies, Principles, Architectures, and Standards / 2:
SOA and Web Services Principles / 2.1:
Web Services Architecture / 2.2:
Web Services Technologies and Standards / 2.3:
SOAP / 2.3.1:
Web Services Description Language (WSDL) / 2.3.2:
Service Discovery: Universal Description, Discovery and Integration (UDDI) / 2.3.3:
Considerations / 2.3.4:
Web Services Infrastructure / 2.4:
Web Services Threats, Vulnerabilities, and Countermeasures / 3:
Threats and Vulnerabilities Concept Definition / 3.1:
Threat Modeling / 3.2:
Vulnerability Categorizations and Catalogs / 3.3:
Threat and Vulnerabilities Metrics / 3.4:
Standards for Web Services Security / 4:
The Concept of Standard / 4.1:
Web Services Security Standards Framework / 4.2:
An Overview of Current Standards / 4.3:
"Near the wire" security standards / 4.3.1:
XML Data Security / 4.3.2:
Security Assertions Markup Language (SAML) / 4.3.3:
SOAP Message Security / 4.3.4:
Key and Trust Management standards / 4.3.5:
Standards for Policy Specification / 4.3.6:
Access Control Policy Standards / 4.3.7:
Implementations of Web Services Security Standards / 4.4:
Standards-related Issues / 4.5:
Digital Identity Management and Trust Negotiation / 5:
Overview of Digital Identity Management / 5.1:
Overview of Existing Proposals / 5.2:
Liberty Alliance / 5.2.1:
WS-Federation / 5.2.2:
Comparison of Liberty Alliance and WS-Framework / 5.2.3:
Other Digital Identity Management Initiatives / 5.2.4:
Discussion on Security of Identity Management Systems / 5.3:
Business Processes / 5.4:
Deploying Multifactor Authentication for Business Processes / 5.4.1:
Architecture / 5.4.2:
Digital Identity Management in Grid Systems / 5.5:
The Trust Negotiation Paradigm and its Deployment using SOA / 5.6:
Trust Negotiation and Digital Identity Management / 5.7:
Automated Trust Negotiation and Digital Identity Management Systems: Differences and Similarities / 5.7.1:
Integrating Identity Management and Trust Negotiations / 5.8:
Architecture of a SP in FAMTN / 5.8.1:
An Example of a Use Case: FSP in Liberty Web Services Framework / 5.8.2:
Negotiations in an FAMTN Federation / 5.9:
Ticketing system in an FAMTN Federation / 5.9.1:
Implementing Trust Tickets Through Cookies / 5.9.2:
Negotiation in Identity Federated Systems / 5.9.3:
Bibliographic Notes / 5.10:
Access Control for Web Services / 6:
Approaches to Enforce Access Control for Web Services / 6.1:
WS-AC1: An Adaptive Access Control Model for Stateless Web Services / 6.2:
The WS-AC1 Model / 6.2.1:
WS-AC1 Identity Attribute Negotiation / 6.2.2:
WS-AC1 Parameter Negotiation / 6.2.3:
An Access Control Framework for Conversation-Based Web services / 6.3:
Conversation-Based Access Control / 6.3.1:
Access Control and Credentials / 6.3.2:
k-Trust Levels and Policies / 6.3.3:
Access Control Enforcement / 6.3.4:
K-Trustworthiness Levels Computation / 6.3.5:
Architecture of the Enforcement System / 6.3.6:
Secure Publishing Techniques / 7:
The Merkle Signatures / 7.1:
Merkle Signatures for Trees / 7.1.1:
Merkle Signatures for XML Documents / 7.1.2:
Merkle Hash Verification for Documents with Partially Hidden Contents / 7.1.3:
Application of the Merkle Signature to UDDI Registries / 7.2:
Merkle Signature Representation / 7.2.1:
Merkle Hash Path Representation / 7.2.2:
A Comparison of Merkle Signatures with XML Signatures / 7.2.3:
Access Control for Business Processes / 7.3:
Access Control for Workflows and Business Processes / 8.1:
Web Services Business Process Execution Language (WS-BPEL) / 8.2:
RBAC-WS-BPEL: An Authorization Model for WS-BPEL Business Processes / 8.3:
RBAC XACML: Authorization Schema / 8.4:
Business Process Constraint Language / 8.5:
RBAC-WS-BPEL Authorization Specification / 8.6:
RBAC-WS-BPEL Enforcement / 8.7:
RBAC-WS-BPEL System Architecture / 8.8:
Handling activity Execution and RBAC-WS-BPEL Enforcement / 8.9:
Emerging Research Trends / 9:
Security as a Service / 9.1:
Motivations / 9.1.1:
Reference Framework for Security Services / 9.1.2:
Authentication Service / 9.1.3:
Privacy for Web Services / 9.2:
P3P and the Privacy-Aware RBAC Model / 9.2.1:
Privacy-Preserving Data Management Techniques / 9.2.2:
W3C Privacy Requirements for Web Services and Research Issues / 9.2.3:
Semantic Web Security / 9.3:
Concluding Remarks / 9.4:
Access Control / A:
Basic Notions / A.1:
The Protection Matrix Model / A.1.1:
Access Control Lists and Capability Lists / A.1.2:
Negative Authorizations / A.1.3:
Role-Based Access Control / A.2:
References / A.3:
Index
Introduction / 1:
Security for Web Services and Security Goals / 1.1:
Privacy / 1.2:
10.

電子ブック

EB
Elisa Bertino, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York NY : ACM, 2013
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼