Data and Applications Security and Privacy XXVIII
Editat de Vijay Atluri, Günther Pernulen Limba Engleză Paperback – 24 iul 2014
Preț: 326.91 lei
Preț vechi: 408.64 lei
-20% Nou
Puncte Express: 490
Preț estimativ în valută:
57.85€ • 67.46$ • 50.79£
57.85€ • 67.46$ • 50.79£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783662439357
ISBN-10: 3662439352
Pagini: 412
Ilustrații: XVIII, 391 p. 97 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.62 kg
Ediția:2014
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3662439352
Pagini: 412
Ilustrații: XVIII, 391 p. 97 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.62 kg
Ediția:2014
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Integrity Assurance for Outsourced Databases without DBMS Modification.- Specification and Deployment of Integrated Security Policies for Outsourced Data.- Optimizing Integrity Checks for Join Queries in the Cloud.- Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials.- Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.- Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud.- Data Leakage Quantification.- Toward Software Diversity in Heterogeneous Networked Systems.- FSquaDRA: Fast Detection of Repackaged Applications.- ‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices.- Design Patterns for Multiple Stakeholders in Social Computing.- Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.- ELITE: zEro Links Identity managemenT systEm.- Dynamic Workflow Adjustment with Security Constraints.- Consistent Query Plan Generation in Secure Cooperative Data Access.- Hunting the Unknown: White-Box Database Leakage Detection.- Incremental Analysis of Evolving Administrative Role Based Access Control Policies.- Mining Attribute-Based Access Control Policies from Logs.- Attribute-Aware Relationship-Based Access Control for Online Social Networks.- Randomly Partitioned Encryption for Cloud Databases.- Towards Secure Cloud Database with Fine-Grained Access Control.- Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database.- LPM: Layered Policy Management for Software-Defined Networks.- On Minimizing the Size of Encrypted Databases.- Efficient and Enhanced Solutions for Content Sharing in DRM Systems.- A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters.