Data and Applications Security XXII
Editat de Vijay Atlurien Limba Engleză Paperback – iul 2008
Preț: 325.63 lei
Preț vechi: 407.04 lei
-20%
Puncte Express: 488
Preț estimativ în valută:
57.54€ • 66.32$ • 50.23£
57.54€ • 66.32$ • 50.23£
Carte tipărită la comandă
Livrare economică 16-30 mai
Specificații
ISBN-13: 9783540705666
ISBN-10: 354070566X
Pagini: 368
Ilustrații: XI, 352 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:2008
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 354070566X
Pagini: 368
Ilustrații: XI, 352 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:2008
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Access Control.- Dynamic Meta-level Access Control in SQL.- On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model.- Audit and Logging.- A Unified Audit Expression Model for Auditing SQL Queries.- A New Approach to Secure Logging.- Keynote.- Security, Functionality and Scale?.- Privacy I.- P4A: A New Privacy Model for XML.- Privacy-Aware Collaborative Access Control in Web-Based Social Networks.- A Privacy-Preserving Ticketing System.- The Analysis of Windows Vista Disk Encryption Algorithm.- Shared and Searchable Encrypted Data for Untrusted Servers.- Secure Construction of Contingency Tables from Distributed Data.- Web Services Security: Techniques and Challenges (Extended Abstract).- Empirical Analysis of Certificate Revocation Lists.- Using New Tools for Certificate Repositories Generation in MANETs.- Privacy II.- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure.- Protecting the Publishing Identity in Multiple Tuples.- Panel Session: What Are the Key Challenges in Distributed Security?.- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services.- Sharing but Protecting Content Against Internal Leakage for Organisations.- Regulating Exceptions in Healthcare Using Policy Spaces.- Towards Automation of Testing High-Level Security Properties.- An Attack Graph-Based Probabilistic Security Metric.- An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.- DIWeDa - Detecting Intrusions in Web Databases.- Securing Workflows with XACML, RDF and BPEL.