Handbook of Database Security Applications and Trends /

The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Gertz, Michael (Επιμελητής έκδοσης), Jajodia, Sushil (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2008.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04078nam a22005415i 4500
001 978-0-387-48533-1
003 DE-He213
005 20151204170831.0
007 cr nn 008mamaa
008 100301s2008 xxu| s |||| 0|eng d
020 |a 9780387485331  |9 978-0-387-48533-1 
024 7 |a 10.1007/978-0-387-48533-1  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
245 1 0 |a Handbook of Database Security  |h [electronic resource] :  |b Applications and Trends /  |c edited by Michael Gertz, Sushil Jajodia. 
264 1 |a Boston, MA :  |b Springer US,  |c 2008. 
300 |a XIV, 577 p. 60 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Recent Advances in Access Control -- Access Control Models for XML -- Access Control Policy Languages in XML -- Database Issues in Trust Management and Trust Negotiation -- Authenticated Index Structures for Outsourced Databases -- Towards Secure Data Outsourcing -- Managing and Querying Encrypted Data -- Security in Data Warehouses and OLAP Systems -- Security for Workflow Systems -- Secure Semantic Web Services -- Geospatial Database Security -- Security Re-engineering for Databases: Concepts and Techniques -- Database Watermarking for Copyright Protection -- Database Watermarking: A Systematic View -- Trustworthy Records Retention -- Damage Quarantine and Recovery in Data Processing Systems -- Hippocratic Databases: Current Capabilities and Future Trends -- Privacy-Preserving Data Mining: A Survey -- Privacy in Database Publishing: A Bayesian Perspective -- Privacy Preserving Publication: Anonymization Frameworks and Principles -- Privacy Protection through Anonymity in Location-based Services -- Privacy-enhanced Location-based Access Control -- Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment. 
520 |a The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents the most comprehensive work on numerous data security aspects published in the last ten years. The Handbook of Database Security: Applications & Trends places a particular focus on data-centric security aspects that reach beyond traditional and well-studied data security aspects in databases. It also covers security in advanced database systems, data privacy and trust management, and data outsourcing, and outlines directions for future research in these fields. The Handbook of Database Security: Applications & Trends is designed for a professional audience composed of practitioners and researchers in industry and academia as a reference book. This volume is also suitable for advanced-level students in computer science interested in the state-of-the-art in data security. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 0 |a Database management. 
650 0 |a Information storage and retrieval. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Database Management. 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
700 1 |a Gertz, Michael.  |e editor. 
700 1 |a Jajodia, Sushil.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9780387485324 
856 4 0 |u http://dx.doi.org/10.1007/978-0-387-48533-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)