Data and Applications Security XXI
Springer Berlin (Verlag)
978-3-540-73533-5 (ISBN)
Secure Query Evaluation.- Confidentiality Policies for Controlled Query Evaluation.- Provably-Secure Schemes for Basic Query Support in Outsourced Databases.- Authenticated Relational Tables and Authenticated Skip Lists.- Location-Based Security/Mobile Security.- Location Privacy Protection Through Obfuscation-Based Techniques.- Efficient Security Policy Enforcement in a Location Based Service Environment.- Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.- Short Papers.- Privacy-Preserving Schema Matching Using Mutual Information.- The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.- Distributed Security Issues.- Measuring the Overall Security of Network Configurations Using Attack Graphs.- Enforcing Honesty in Assured Information Sharing Within a Distributed System.- A Privacy-Enhanced Attribute-Based Access Control System.- Cryptographic-Based Security.- A Scalable and Secure Cryptographic Service.- gVault: A Gmail Based Cryptographic Network File System.- Design and Analysis of Querying Encrypted Data in Relational Databases.- Temporal Access Control and Usage Control.- Dynamic Event-Based Access Control as Term Rewriting.- A Spatio-temporal Role-Based Access Control Model.- Towards a Times-Based Usage Control Model.- System Security Issues.- New Paradigm of Inference Control with Trusted Computing.- Security Patterns for Physical Access Control Systems.- XACML Policies for Exclusive Resource Usage.
Erscheint lt. Verlag | 22.6.2007 |
---|---|
Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
Zusatzinfo | X, 293 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 468 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • Auditing • authentication • authorization • concurrency control • Configuration • cryptography • Database Security • Data Security • Distributed Systems • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Inference Control • Information • integrity maintenance • privacy • Risk Management • secu • secure information integration • security • security assessment • security protocol • security tradeoffs • Software Patterns • trusted computing • User Tracking • web application security • xml security • XML watermarking |
ISBN-10 | 3-540-73533-X / 354073533X |
ISBN-13 | 978-3-540-73533-5 / 9783540735335 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich