Data and Applications Security XXI
Springer Berlin (Verlag)
9783540735335 (ISBN)
Secure Query Evaluation.- Confidentiality Policies for Controlled Query Evaluation.- Provably-Secure Schemes for Basic Query Support in Outsourced Databases.- Authenticated Relational Tables and Authenticated Skip Lists.- Location-Based Security/Mobile Security.- Location Privacy Protection Through Obfuscation-Based Techniques.- Efficient Security Policy Enforcement in a Location Based Service Environment.- Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.- Short Papers.- Privacy-Preserving Schema Matching Using Mutual Information.- The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.- Distributed Security Issues.- Measuring the Overall Security of Network Configurations Using Attack Graphs.- Enforcing Honesty in Assured Information Sharing Within a Distributed System.- A Privacy-Enhanced Attribute-Based Access Control System.- Cryptographic-Based Security.- A Scalable and Secure Cryptographic Service.- gVault: A Gmail Based Cryptographic Network File System.- Design and Analysis of Querying Encrypted Data in Relational Databases.- Temporal Access Control and Usage Control.- Dynamic Event-Based Access Control as Term Rewriting.- A Spatio-temporal Role-Based Access Control Model.- Towards a Times-Based Usage Control Model.- System Security Issues.- New Paradigm of Inference Control with Trusted Computing.- Security Patterns for Physical Access Control Systems.- XACML Policies for Exclusive Resource Usage.
| Erscheint lt. Verlag | 22.6.2007 |
|---|---|
| Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
| Zusatzinfo | X, 293 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 468 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • Algorithm analysis and problem complexity • Auditing • authentication • authorization • concurrency control • Configuration • cryptography • Database Security • Data Security • Distributed Systems • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Inference Control • Information • integrity maintenance • privacy • Risk Management • secu • secure information integration • security • security assessment • security protocol • security tradeoffs • Software Patterns • trusted computing • User Tracking • web application security • xml security • XML watermarking |
| ISBN-13 | 9783540735335 / 9783540735335 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich