Data and Applications Security XIX
Springer Berlin (Verlag)
9783540281382 (ISBN)
Streams, Security and Scalability.- Towards Privacy-Enhanced Authorization Policies and Languages.- Revocation of Obligation and Authorisation Policy Objects.- Role Slices: A Notation for RBAC Permission Assignment and Enforcement.- Designing Secure Indexes for Encrypted Databases.- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.- Verified Query Results from Hybrid Authentication Trees.- Multilevel Secure Teleconferencing over Public Switched Telephone Network.- Secrecy of Two-Party Secure Computation.- Reliable Scheduling of Advanced Transactions.- Privacy-Preserving Decision Trees over Vertically Partitioned Data.- Privacy-Preserving Collaborative Association Rule Mining.- Privacy-Preserving Distributed k-Anonymity.- Towards Database Firewalls.- Complete Redundancy Detection in Firewalls.- A Comprehensive Approach to Anomaly Detection in Relational Databases.- An Authorization Architecture for Web Services.- Secure Model Management Operations for the Web.- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.- Secure Mediation with Mobile Code.- Security Vulnerabilities in Software Systems: A Quantitative Perspective.- Trading Off Security in a Service Oriented Architecture.- Trusted Identity and Session Management Using Secure Cookies.- Security Issues in Querying Encrypted Data.- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
| Erscheint lt. Verlag | 20.7.2005 |
|---|---|
| Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
| Zusatzinfo | X, 353 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 1140 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • Algorithm analysis and problem complexity • authentication • Code • concurrency control • cryptography • Firewall • Information • integrity maintenance • privacy • recovery methods • Risk Management • secure information integration • security • security assessment • security planning a • security planning and administration • security tradeoffs • semantic web services • Service Oriented Architecture (SOA) • session • web application security |
| ISBN-13 | 9783540281382 / 9783540281382 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich