Cargando…

Handbook of Database Security Applications and Trends /

The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Gertz, Michael (Editor ), Jajodia, Sushil (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-0-387-48533-1
003 DE-He213
005 20221227162143.0
007 cr nn 008mamaa
008 100301s2008 xxu| s |||| 0|eng d
020 |a 9780387485331  |9 978-0-387-48533-1 
024 7 |a 10.1007/978-0-387-48533-1  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Handbook of Database Security  |h [electronic resource] :  |b Applications and Trends /  |c edited by Michael Gertz, Sushil Jajodia. 
250 |a 1st ed. 2008. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2008. 
300 |a XIV, 577 p. 60 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Recent Advances in Access Control -- Access Control Models for XML -- Access Control Policy Languages in XML -- Database Issues in Trust Management and Trust Negotiation -- Authenticated Index Structures for Outsourced Databases -- Towards Secure Data Outsourcing -- Managing and Querying Encrypted Data -- Security in Data Warehouses and OLAP Systems -- Security for Workflow Systems -- Secure Semantic Web Services -- Geospatial Database Security -- Security Re-engineering for Databases: Concepts and Techniques -- Database Watermarking for Copyright Protection -- Database Watermarking: A Systematic View -- Trustworthy Records Retention -- Damage Quarantine and Recovery in Data Processing Systems -- Hippocratic Databases: Current Capabilities and Future Trends -- Privacy-Preserving Data Mining: A Survey -- Privacy in Database Publishing: A Bayesian Perspective -- Privacy Preserving Publication: Anonymization Frameworks and Principles -- Privacy Protection through Anonymity in Location-based Services -- Privacy-enhanced Location-based Access Control -- Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment. 
520 |a The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents the most comprehensive work on numerous data security aspects published in the last ten years. The Handbook of Database Security: Applications & Trends places a particular focus on data-centric security aspects that reach beyond traditional and well-studied data security aspects in databases. It also covers security in advanced database systems, data privacy and trust management, and data outsourcing, and outlines directions for future research in these fields. The Handbook of Database Security: Applications & Trends is designed for a professional audience composed of practitioners and researchers in industry and academia as a reference book. This volume is also suitable for advanced-level students in computer science interested in the state-of-the-art in data security. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data protection. 
650 0 |a Database management. 
650 0 |a Information storage and retrieval systems. 
650 0 |a Computer networks . 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 1 4 |a Cryptology. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Database Management. 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Structures and Information Theory. 
700 1 |a Gertz, Michael.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Jajodia, Sushil.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9780387516844 
776 0 8 |i Printed edition:  |z 9781441943057 
776 0 8 |i Printed edition:  |z 9780387485324 
776 0 8 |i Printed edition:  |z 9781071631058 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-0-387-48533-1  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)