![](/images/blank-book/blank-book.1920.jpg)
Parameters
More about the book
InhaltsverzeichnisEncrypted Data Access.Efficient Key Updates in Encrypted Database Systems.Metadata Management in Outsourced Encrypted Databases.Experiments with Queries over Encrypted Data Using Secret Sharing.Access Control.An Authorization Framework for Sharing Data in Web Service Federations.User-Managed Access Control for Health Care Systems.Specifying an Access Control Model for Ontologies for the Semantic Web.A Formal Access Control Model for XML Databases.Information Disclosure Control in Databases.Can Attackers Learn from Samples?.Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution.Detecting Privacy Violations in Sensitive XML Databases.Suppressing Microdata to Prevent Probabilistic Classification Based Inference.On Deducibility and Anonymisation in Medical Databases.Privacy and Security Support for Distributed Applications.Protecting Privacy Against Location-Based Personal Identification.Information SeeSaw: Availability vs. Security Management in the UbiComp World.XML Security in the Next Generation Optical Disc Context.Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes.
Book purchase
Secure data management, Willem Jonker
- Language
- Released
- 2005
Payment methods
- Title
- Secure data management
- Language
- English
- Authors
- Willem Jonker
- Publisher
- Springer
- Released
- 2005
- ISBN10
- 3540287981
- ISBN13
- 9783540287988
- Category
- Computers, IT, Programming
- Description
- InhaltsverzeichnisEncrypted Data Access.Efficient Key Updates in Encrypted Database Systems.Metadata Management in Outsourced Encrypted Databases.Experiments with Queries over Encrypted Data Using Secret Sharing.Access Control.An Authorization Framework for Sharing Data in Web Service Federations.User-Managed Access Control for Health Care Systems.Specifying an Access Control Model for Ontologies for the Semantic Web.A Formal Access Control Model for XML Databases.Information Disclosure Control in Databases.Can Attackers Learn from Samples?.Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution.Detecting Privacy Violations in Sensitive XML Databases.Suppressing Microdata to Prevent Probabilistic Classification Based Inference.On Deducibility and Anonymisation in Medical Databases.Privacy and Security Support for Distributed Applications.Protecting Privacy Against Location-Based Personal Identification.Information SeeSaw: Availability vs. Security Management in the UbiComp World.XML Security in the Next Generation Optical Disc Context.Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes.