Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6166
Editat de Sara Foresti, Sushil Jajodiaen Limba Engleză Paperback – 9 iun 2010
Din seria Lecture Notes in Computer Science
- 20%
Preț: 390.18 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 461.77 lei - 20%
Preț: 527.36 lei - 20%
Preț: 497.04 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 391.14 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.72 lei - 20%
Preț: 461.06 lei - 20%
Preț: 390.69 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 390.35 lei - 20%
Preț: 391.20 lei - 20%
Preț: 392.64 lei - 20%
Preț: 389.90 lei - 20%
Preț: 639.72 lei - 20%
Preț: 461.65 lei - 20%
Preț: 462.05 lei - 15%
Preț: 388.50 lei - 5%
Preț: 516.27 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 535.77 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 400.17 lei - 20%
Preț: 403.00 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 325.79 lei
Preț vechi: 407.24 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
57.66€ • 67.22$ • 50.43£
57.66€ • 67.22$ • 50.43£
Carte disponibilă
Livrare economică 30 decembrie 25 - 13 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642137389
ISBN-10: 3642137385
Pagini: 376
Ilustrații: XIII, 376 p. 80 illus.
Greutate: 0.59 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642137385
Pagini: 376
Ilustrații: XIII, 376 p. 80 illus.
Greutate: 0.59 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Query and Data Privacy.- Generalizing PIR for Practical Private Retrieval of Public Data.- A Logic of Privacy.- Understanding Privacy Risk of Publishing Decision Trees.- Data Protection.- Secure Outsourcing of DNA Searching via Finite Automata.- A Labelling System for Derived Data Control.- On the Identification of Property Based Generalizations in Microdata Anonymization.- Access Control.- Role Mining in the Presence of Noise.- Distributed and Secure Access Control in P2P Databases.- Constructing Key Assignment Schemes from Chain Partitions.- Data Confidentiality and Query Verification.- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality.- Efficient Inference Control for Open Relational Queries.- Query Racing: Fast Completeness Certification of Query Results.- Policy Definition and Enforcement.- Mining Likely Properties of Access Control Policies via Association Rule Mining.- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control.- Enforcing Request Integrity in Web Applications.- Trust and Identity Management.- Using Trust-Based Information Aggregation for Predicting Security Level of Systems.- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms.- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms.- Short Papers.- An Access Control Model for Web Databases.- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems.- Evaluating the Risk of Adopting RBAC Roles.- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance.- When ABE Meets RSS.- PriMan : A Privacy-Preserving Identity Framework.- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach.- Authentication Assurance Level Taxonomies for Smart Identity TokenDeployments - A New Approach.- A Secure RFID Ticket System for Public Transport.- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols.- Secure Location Verification.