Data and Applications Security and Privacy XXVIII: Lecture Notes in Computer Science
Editat de Vijay Atluri, Günther Pernulen Limba Engleză Paperback – 24 iul 2014
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei - 20%
Preț: 629.71 lei -
Preț: 395.25 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 342.61 lei - 20%
Preț: 327.36 lei - 20%
Preț: 336.86 lei - 20%
Preț: 487.46 lei - 20%
Preț: 324.19 lei - 20%
Preț: 432.78 lei - 20%
Preț: 293.24 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 850.42 lei - 20%
Preț: 328.94 lei - 20%
Preț: 573.45 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 679.09 lei - 20%
Preț: 373.16 lei - 20%
Preț: 782.57 lei - 20%
Preț: 434.17 lei - 20%
Preț: 489.11 lei - 20%
Preț: 904.16 lei - 20%
Preț: 375.72 lei - 20%
Preț: 400.17 lei - 20%
Preț: 631.96 lei - 20%
Preț: 373.80 lei - 20%
Preț: 556.96 lei - 20%
Preț: 731.97 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 15%
Preț: 558.12 lei - 20%
Preț: 400.77 lei - 20%
Preț: 488.90 lei - 20%
Preț: 340.04 lei - 20%
Preț: 403.00 lei - 20%
Preț: 327.36 lei - 20%
Preț: 330.54 lei - 20%
Preț: 568.70 lei - 20%
Preț: 563.29 lei - 20%
Preț: 315.62 lei - 20%
Preț: 355.27 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 519.32 lei
Preț: 326.91 lei
Preț vechi: 408.64 lei
-20%
Puncte Express: 490
Preț estimativ în valută:
57.81€ • 67.84$ • 50.14£
57.81€ • 67.84$ • 50.14£
Carte tipărită la comandă
Livrare economică 09-23 martie
Specificații
ISBN-13: 9783662439357
ISBN-10: 3662439352
Pagini: 412
Ilustrații: XVIII, 391 p. 97 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.62 kg
Ediția:2014
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3662439352
Pagini: 412
Ilustrații: XVIII, 391 p. 97 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.62 kg
Ediția:2014
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Integrity Assurance for Outsourced Databases without DBMS Modification.- Specification and Deployment of Integrated Security Policies for Outsourced Data.- Optimizing Integrity Checks for Join Queries in the Cloud.- Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials.- Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.- Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud.- Data Leakage Quantification.- Toward Software Diversity in Heterogeneous Networked Systems.- FSquaDRA: Fast Detection of Repackaged Applications.- ‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices.- Design Patterns for Multiple Stakeholders in Social Computing.- Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.- ELITE: zEro Links Identity managemenT systEm.- Dynamic Workflow Adjustment with Security Constraints.- Consistent Query Plan Generation in Secure Cooperative Data Access.- Hunting the Unknown: White-Box Database Leakage Detection.- Incremental Analysis of Evolving Administrative Role Based Access Control Policies.- Mining Attribute-Based Access Control Policies from Logs.- Attribute-Aware Relationship-Based Access Control for Online Social Networks.- Randomly Partitioned Encryption for Cloud Databases.- Towards Secure Cloud Database with Fine-Grained Access Control.- Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database.- LPM: Layered Policy Management for Software-Defined Networks.- On Minimizing the Size of Encrypted Databases.- Efficient and Enhanced Solutions for Content Sharing in DRM Systems.- A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters.