Research Directions in Data and Applications Security
Editat de Ehud Gudes, Sujeet Shenoien Limba Engleză Paperback – 2 mar 2013
-Database Security;
-XML Security;
-Data Mining and Inference;
-Multimedia System Security;
-Network Security;
-Public Key Infrastructure;
-Formal Methods and Protocols;
-Security and Privacy.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 625.41 lei 6-8 săpt. | |
| Springer – 2 mar 2013 | 625.41 lei 6-8 săpt. | |
| Hardback (1) | 631.00 lei 6-8 săpt. | |
| Springer – 31 iul 2003 | 631.00 lei 6-8 săpt. |
Preț: 625.41 lei
Preț vechi: 781.76 lei
-20% Nou
Puncte Express: 938
Preț estimativ în valută:
110.67€ • 129.06$ • 97.17£
110.67€ • 129.06$ • 97.17£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781475764130
ISBN-10: 1475764138
Pagini: 368
Ilustrații: XXII, 350 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:Softcover reprint of the original 1st ed. 2003
Editura: Springer
Locul publicării:New York, NY, United States
ISBN-10: 1475764138
Pagini: 368
Ilustrații: XXII, 350 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:Softcover reprint of the original 1st ed. 2003
Editura: Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
I Role-Based Access Control.- 1 Shielding RBAC Infrastructures from Cyberterrorism.- 2 Privilege Administration for the Role Graph Model.- 3 Implementing RBAC Policies.- 4 Role Delegation for a Resource-Based Security Model.- 5 Using X.509 Attribute Certificates for Role-Based EAM.- 6 Implementing Workflow Systems.- II Database Security.- 7 Multiphase Damage Confinement System for Databases.- 8 Analyzing Transaction Logs for Effective Damage Assessment.- 9 Deductive Database Security.- III XML Security.- 10 Towards Secure XML Federations.- 11 Secure XML Views.- 12 Distributed Cooperative Updates of XML Documents.- IV Data Mining and Inference.- 13 On Security and Privacy Risks in Association Mining Algorithms.- 14 Mining Malicious Corruption of Data with Hidden Markov Models.- 15 A Study of Inference Problems in Distributed Databases.- V Multimedia System Security.- 16 Uniform Indexing for Geospatial Data and Authorizations.- 17 Access Control of SVG Documents.- VI Network Security.- 18 On Modeling Computer Networks for Vulnerability Analysis.- 19 On-line Intrusion Protection by Detecting Attacks with Diversity.- VII Public Key Infrastructure.- 20 Recertification: A Technique to Improve Services in PKI.- 21 A Hybrid PKI Model: Application to Secure Mediation.- VIII Formal Methods and Protocols.- 22 Implementation and Verification of Programmable Security.- 23 A Process Algebraic Approach to Security Policies.- 24 Anonymous and Secure Multicast Subscription.- IX Security and Privacy.- 25 Privacy and Civil Liberties.