Cargando…

Security, Privacy, and Trust in Modern Data Management

The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Petkovic, Milan (Editor ), Jonker, Willem (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Data-Centric Systems and Applications,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-69861-6
003 DE-He213
005 20220118120755.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 |a 9783540698616  |9 978-3-540-69861-6 
024 7 |a 10.1007/978-3-540-69861-6  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Security, Privacy, and Trust in Modern Data Management  |h [electronic resource] /  |c edited by Milan Petkovic, Willem Jonker. 
250 |a 1st ed. 2007. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2007. 
300 |a XVIII, 472 p. 89 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Data-Centric Systems and Applications,  |x 2197-974X 
505 0 |a Privacy and Security Issues in a Digital World -- Privacy in the Law -- Ethical Aspects of Information Security and Privacy -- Data and System Security -- Authorization and Access Control -- Role-Based Access Control -- XML Security -- Database Security -- Trust Management -- Trusted Platforms -- Strong Authentication with Physical Unclonable Functions -- Privacy Enhancing -- Privacy-Preserving Data Mining -- Statistical Database Security -- Different Search Strategies on Encrypted Data Compared -- Client-Server Trade-Offs in Secure Computation -- Federated Identity Management -- Accountable Anonymous Communication -- Digital Asset Protection -- An Introduction to Digital Rights Management Systems -- Copy Protection Systems -- Forensic Watermarking in Digital Rights Management -- Person-Based and Domain-Based Digital Rights Management -- Digital Rights Management Interoperability -- DRM for Protecting Personal Content -- Enhancing Privacy for Digital Rights Management -- Selected Topics on Privacy and Security in Ambient Intelligence -- The Persuasiveness of Ambient Intelligence -- Privacy Policies -- Security and Privacy on the Semantic Web -- Private Person Authentication in an Ambient World -- RFID and Privacy -- Malicious Software in Ubiquitous Computing. 
520 |a The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems are much more vulnerable to attacks and unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy. In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect to security, privacy and trust. After the introductory part that offers a perspective on privacy and security issues in the modern digital world, the contributions from leading researchers are grouped into sections on data and system security, privacy-enhancing techniques, digital asset protection, and selected topics on privacy and security in ambient intelligence. Overall, the book delivers, from information on the ethical and legislative background, to chapters on the state-of-the-art technologies such as access control, identity management and digital rights management to advice on implementing fair information practices and preventing security and privacy violations. With this broad approach, this book appeals equally to researchers and graduate students looking for an overview of this area of ever-growing importance and to professional developers who require sound theoretical grounds for the design and implementation of secure privacy-preserving ubiquitous applications. 
650 0 |a Data protection. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Database management. 
650 0 |a Application software. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Database Management. 
650 2 4 |a Computer and Information Systems Applications. 
700 1 |a Petkovic, Milan.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Jonker, Willem.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540834984 
776 0 8 |i Printed edition:  |z 9783642089268 
776 0 8 |i Printed edition:  |z 9783540698609 
830 0 |a Data-Centric Systems and Applications,  |x 2197-974X 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-540-69861-6  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)