Data and Applications Security XIX
Springer Berlin (Verlag)
978-3-540-28138-2 (ISBN)
Streams, Security and Scalability.- Towards Privacy-Enhanced Authorization Policies and Languages.- Revocation of Obligation and Authorisation Policy Objects.- Role Slices: A Notation for RBAC Permission Assignment and Enforcement.- Designing Secure Indexes for Encrypted Databases.- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.- Verified Query Results from Hybrid Authentication Trees.- Multilevel Secure Teleconferencing over Public Switched Telephone Network.- Secrecy of Two-Party Secure Computation.- Reliable Scheduling of Advanced Transactions.- Privacy-Preserving Decision Trees over Vertically Partitioned Data.- Privacy-Preserving Collaborative Association Rule Mining.- Privacy-Preserving Distributed k-Anonymity.- Towards Database Firewalls.- Complete Redundancy Detection in Firewalls.- A Comprehensive Approach to Anomaly Detection in Relational Databases.- An Authorization Architecture for Web Services.- Secure Model Management Operations for the Web.- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.- Secure Mediation with Mobile Code.- Security Vulnerabilities in Software Systems: A Quantitative Perspective.- Trading Off Security in a Service Oriented Architecture.- Trusted Identity and Session Management Using Secure Cookies.- Security Issues in Querying Encrypted Data.- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
Erscheint lt. Verlag | 20.7.2005 |
---|---|
Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
Zusatzinfo | X, 353 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1140 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • authentication • Code • concurrency control • cryptography • Firewall • Information • integrity maintenance • privacy • recovery methods • Risk Management • secure information integration • security • security assessment • security planning a • security planning and administration • security tradeoffs • semantic web services • Service Oriented Architecture (SOA) • session • web application security |
ISBN-10 | 3-540-28138-X / 354028138X |
ISBN-13 | 978-3-540-28138-2 / 9783540281382 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich