Preserving Privacy in Data Outsourcing: Advances in Information Security, cartea 51
Autor Sara Forestien Limba Engleză Paperback – dec 2012
Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.
Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondarytext or reference book.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 606.88 lei 6-8 săpt. | |
Springer Us – dec 2012 | 606.88 lei 6-8 săpt. | |
Hardback (1) | 612.68 lei 6-8 săpt. | |
Springer Us – 13 oct 2010 | 612.68 lei 6-8 săpt. |
Din seria Advances in Information Security
- 20% Preț: 613.11 lei
- 20% Preț: 1103.97 lei
- 20% Preț: 604.57 lei
- 15% Preț: 603.66 lei
- 20% Preț: 613.17 lei
- 20% Preț: 1091.17 lei
- 18% Preț: 951.66 lei
- 20% Preț: 516.40 lei
- 20% Preț: 1099.77 lei
- 18% Preț: 1584.99 lei
- 20% Preț: 884.18 lei
- 20% Preț: 1109.14 lei
- 18% Preț: 898.91 lei
- 20% Preț: 943.07 lei
- 20% Preț: 610.64 lei
- 20% Preț: 609.36 lei
- 15% Preț: 607.37 lei
- 20% Preț: 613.43 lei
- 20% Preț: 613.90 lei
- 20% Preț: 618.11 lei
- 20% Preț: 609.05 lei
- 20% Preț: 606.57 lei
- 15% Preț: 605.85 lei
- 15% Preț: 603.82 lei
- 20% Preț: 776.60 lei
- 18% Preț: 1154.49 lei
- 15% Preț: 606.15 lei
- 24% Preț: 693.62 lei
- 15% Preț: 605.68 lei
Preț: 606.88 lei
Preț vechi: 758.60 lei
-20% Nou
Puncte Express: 910
Preț estimativ în valută:
116.17€ • 124.90$ • 96.84£
116.17€ • 124.90$ • 96.84£
Carte tipărită la comandă
Livrare economică 19 decembrie 24 - 02 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781461426998
ISBN-10: 1461426995
Pagini: 196
Ilustrații: XV, 180 p.
Dimensiuni: 155 x 235 x 10 mm
Greutate: 0.29 kg
Ediția:2011
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
ISBN-10: 1461426995
Pagini: 196
Ilustrații: XV, 180 p.
Dimensiuni: 155 x 235 x 10 mm
Greutate: 0.29 kg
Ediția:2011
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
Introduction.- Related work.- Selective encryption to enforce access control.- Combining fragmentation and encryption to protect data privacy.- Distributed query processing under safely composed permissions.- Conclusions.
Caracteristici
Addresses the problem of protecting information in the emerging data outsourcing scenarios Presents relevant and critical novel problems and novel techniques for their solution Provides a comprehensive overview of the state of the art and an easy to grasp illustration of the data protection problem in outsourcing scenarios, as well as a rigorous analysis and formalization of the problem and solutions Includes supplementary material: sn.pub/extras