
Parameters
More about the book
InhaltsverzeichnisStreams, Security and Scalability.Towards Privacy-Enhanced Authorization Policies and Languages.Revocation of Obligation and Authorisation Policy Objects.Role Slices: A Notation for RBAC Permission Assignment and Enforcement.Designing Secure Indexes for Encrypted Databases.Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.Verified Query Results from Hybrid Authentication Trees.Multilevel Secure Teleconferencing over Public Switched Telephone Network.Secrecy of Two-Party Secure Computation.Reliable Scheduling of Advanced Transactions.Privacy-Preserving Decision Trees over Vertically Partitioned Data.Privacy-Preserving Collaborative Association Rule Mining.Privacy-Preserving Distributed k-Anonymity.Towards Database Firewalls.Complete Redundancy Detection in Firewalls.A Comprehensive Approach to Anomaly Detection in Relational Databases.An Authorization Architecture for Web Services.Secure Model Management Operations for the Web.A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.Secure Mediation with Mobile Code.Security Vulnerabilities in Software Systems: A Quantitative Perspective.Trading Off Security in a Service Oriented Architecture.Trusted Identity and Session Management Using Secure Cookies.Security Issues in Querying Encrypted Data.Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
Book purchase
Data and applications security XIX, Sushil Jajodia
- Language
- Released
- 2005
Payment methods
- Title
- Data and applications security XIX
- Language
- English
- Authors
- Sushil Jajodia
- Publisher
- Springer
- Released
- 2005
- ISBN10
- 354028138X
- ISBN13
- 9783540281382
- Category
- Computers, IT, Programming
- Description
- InhaltsverzeichnisStreams, Security and Scalability.Towards Privacy-Enhanced Authorization Policies and Languages.Revocation of Obligation and Authorisation Policy Objects.Role Slices: A Notation for RBAC Permission Assignment and Enforcement.Designing Secure Indexes for Encrypted Databases.Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.Verified Query Results from Hybrid Authentication Trees.Multilevel Secure Teleconferencing over Public Switched Telephone Network.Secrecy of Two-Party Secure Computation.Reliable Scheduling of Advanced Transactions.Privacy-Preserving Decision Trees over Vertically Partitioned Data.Privacy-Preserving Collaborative Association Rule Mining.Privacy-Preserving Distributed k-Anonymity.Towards Database Firewalls.Complete Redundancy Detection in Firewalls.A Comprehensive Approach to Anomaly Detection in Relational Databases.An Authorization Architecture for Web Services.Secure Model Management Operations for the Web.A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.Secure Mediation with Mobile Code.Security Vulnerabilities in Software Systems: A Quantitative Perspective.Trading Off Security in a Service Oriented Architecture.Trusted Identity and Session Management Using Secure Cookies.Security Issues in Querying Encrypted Data.Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.