
Parametry
Více o knize
InhaltsverzeichnisStreams, Security and Scalability.Towards Privacy-Enhanced Authorization Policies and Languages.Revocation of Obligation and Authorisation Policy Objects.Role Slices: A Notation for RBAC Permission Assignment and Enforcement.Designing Secure Indexes for Encrypted Databases.Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.Verified Query Results from Hybrid Authentication Trees.Multilevel Secure Teleconferencing over Public Switched Telephone Network.Secrecy of Two-Party Secure Computation.Reliable Scheduling of Advanced Transactions.Privacy-Preserving Decision Trees over Vertically Partitioned Data.Privacy-Preserving Collaborative Association Rule Mining.Privacy-Preserving Distributed k-Anonymity.Towards Database Firewalls.Complete Redundancy Detection in Firewalls.A Comprehensive Approach to Anomaly Detection in Relational Databases.An Authorization Architecture for Web Services.Secure Model Management Operations for the Web.A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.Secure Mediation with Mobile Code.Security Vulnerabilities in Software Systems: A Quantitative Perspective.Trading Off Security in a Service Oriented Architecture.Trusted Identity and Session Management Using Secure Cookies.Security Issues in Querying Encrypted Data.Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
Nákup knihy
Data and applications security XIX, Sushil Jajodia
- Jazyk
- Rok vydání
- 2005
Doručení
Platební metody
Navrhnout úpravu
- Titul
- Data and applications security XIX
- Jazyk
- anglicky
- Autoři
- Sushil Jajodia
- Vydavatel
- Springer
- Rok vydání
- 2005
- ISBN10
- 354028138X
- ISBN13
- 9783540281382
- Kategorie
- Počítače, IT, programování
- Anotace
- InhaltsverzeichnisStreams, Security and Scalability.Towards Privacy-Enhanced Authorization Policies and Languages.Revocation of Obligation and Authorisation Policy Objects.Role Slices: A Notation for RBAC Permission Assignment and Enforcement.Designing Secure Indexes for Encrypted Databases.Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.Verified Query Results from Hybrid Authentication Trees.Multilevel Secure Teleconferencing over Public Switched Telephone Network.Secrecy of Two-Party Secure Computation.Reliable Scheduling of Advanced Transactions.Privacy-Preserving Decision Trees over Vertically Partitioned Data.Privacy-Preserving Collaborative Association Rule Mining.Privacy-Preserving Distributed k-Anonymity.Towards Database Firewalls.Complete Redundancy Detection in Firewalls.A Comprehensive Approach to Anomaly Detection in Relational Databases.An Authorization Architecture for Web Services.Secure Model Management Operations for the Web.A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.Secure Mediation with Mobile Code.Security Vulnerabilities in Software Systems: A Quantitative Perspective.Trading Off Security in a Service Oriented Architecture.Trusted Identity and Session Management Using Secure Cookies.Security Issues in Querying Encrypted Data.Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.