Cantitate/Preț
Produs

Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3654

Editat de Sushil Jajodia, Duminda Wijesekera
en Limba Engleză Paperback – 20 iul 2005

Din seria Lecture Notes in Computer Science

Preț: 38486 lei

Nou

Puncte Express: 577

Preț estimativ în valută:
7365 7651$ 6118£

Carte tipărită la comandă

Livrare economică 01-15 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540281382
ISBN-10: 354028138X
Pagini: 368
Ilustrații: X, 353 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.53 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Streams, Security and Scalability.- Towards Privacy-Enhanced Authorization Policies and Languages.- Revocation of Obligation and Authorisation Policy Objects.- Role Slices: A Notation for RBAC Permission Assignment and Enforcement.- Designing Secure Indexes for Encrypted Databases.- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.- Verified Query Results from Hybrid Authentication Trees.- Multilevel Secure Teleconferencing over Public Switched Telephone Network.- Secrecy of Two-Party Secure Computation.- Reliable Scheduling of Advanced Transactions.- Privacy-Preserving Decision Trees over Vertically Partitioned Data.- Privacy-Preserving Collaborative Association Rule Mining.- Privacy-Preserving Distributed k-Anonymity.- Towards Database Firewalls.- Complete Redundancy Detection in Firewalls.- A Comprehensive Approach to Anomaly Detection in Relational Databases.- An Authorization Architecture for Web Services.- Secure Model Management Operations for the Web.- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.- Secure Mediation with Mobile Code.- Security Vulnerabilities in Software Systems: A Quantitative Perspective.- Trading Off Security in a Service Oriented Architecture.- Trusted Identity and Session Management Using Secure Cookies.- Security Issues in Querying Encrypted Data.- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.