|
|
|
|
LEADER |
04078nam a22005415i 4500 |
001 |
978-0-387-48533-1 |
003 |
DE-He213 |
005 |
20151204170831.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387485331
|9 978-0-387-48533-1
|
024 |
7 |
|
|a 10.1007/978-0-387-48533-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Handbook of Database Security
|h [electronic resource] :
|b Applications and Trends /
|c edited by Michael Gertz, Sushil Jajodia.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2008.
|
300 |
|
|
|a XIV, 577 p. 60 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Recent Advances in Access Control -- Access Control Models for XML -- Access Control Policy Languages in XML -- Database Issues in Trust Management and Trust Negotiation -- Authenticated Index Structures for Outsourced Databases -- Towards Secure Data Outsourcing -- Managing and Querying Encrypted Data -- Security in Data Warehouses and OLAP Systems -- Security for Workflow Systems -- Secure Semantic Web Services -- Geospatial Database Security -- Security Re-engineering for Databases: Concepts and Techniques -- Database Watermarking for Copyright Protection -- Database Watermarking: A Systematic View -- Trustworthy Records Retention -- Damage Quarantine and Recovery in Data Processing Systems -- Hippocratic Databases: Current Capabilities and Future Trends -- Privacy-Preserving Data Mining: A Survey -- Privacy in Database Publishing: A Bayesian Perspective -- Privacy Preserving Publication: Anonymization Frameworks and Principles -- Privacy Protection through Anonymity in Location-based Services -- Privacy-enhanced Location-based Access Control -- Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment.
|
520 |
|
|
|a The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents the most comprehensive work on numerous data security aspects published in the last ten years. The Handbook of Database Security: Applications & Trends places a particular focus on data-centric security aspects that reach beyond traditional and well-studied data security aspects in databases. It also covers security in advanced database systems, data privacy and trust management, and data outsourcing, and outlines directions for future research in these fields. The Handbook of Database Security: Applications & Trends is designed for a professional audience composed of practitioners and researchers in industry and academia as a reference book. This volume is also suitable for advanced-level students in computer science interested in the state-of-the-art in data security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Information storage and retrieval.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Database Management.
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
700 |
1 |
|
|a Gertz, Michael.
|e editor.
|
700 |
1 |
|
|a Jajodia, Sushil.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387485324
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-48533-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|