top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data and Applications Security XIX [[electronic resource] ] : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings / / edited by Sushil Jajodia, Duminda Wijesekera
Data and Applications Security XIX [[electronic resource] ] : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings / / edited by Sushil Jajodia, Duminda Wijesekera
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 353 p.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data encryption (Computer science)
Computer communication systems
Special purpose computers
Operating systems (Computers)
Algorithms
Management information systems
Computer science
Cryptology
Computer Communication Networks
Special Purpose and Application-Based Systems
Operating Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Results from Hybrid Authentication Trees -- Multilevel Secure Teleconferencing over Public Switched Telephone Network -- Secrecy of Two-Party Secure Computation -- Reliable Scheduling of Advanced Transactions -- Privacy-Preserving Decision Trees over Vertically Partitioned Data -- Privacy-Preserving Collaborative Association Rule Mining -- Privacy-Preserving Distributed k-Anonymity -- Towards Database Firewalls -- Complete Redundancy Detection in Firewalls -- A Comprehensive Approach to Anomaly Detection in Relational Databases -- An Authorization Architecture for Web Services -- Secure Model Management Operations for the Web -- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions -- Secure Mediation with Mobile Code -- Security Vulnerabilities in Software Systems: A Quantitative Perspective -- Trading Off Security in a Service Oriented Architecture -- Trusted Identity and Session Management Using Secure Cookies -- Security Issues in Querying Encrypted Data -- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
Record Nr. UNISA-996465913203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data and applications security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005 : proceedings / / Sushil Jajodia, Duminda Wijesekera (eds.)
Data and applications security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005 : proceedings / / Sushil Jajodia, Duminda Wijesekera (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2005
Descrizione fisica 1 online resource (X, 353 p.)
Disciplina 005.8
Altri autori (Persone) JajodiaSushil
WijesekeraDuminda
Collana Lecture notes in computer science
Soggetto topico Database security
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Results from Hybrid Authentication Trees -- Multilevel Secure Teleconferencing over Public Switched Telephone Network -- Secrecy of Two-Party Secure Computation -- Reliable Scheduling of Advanced Transactions -- Privacy-Preserving Decision Trees over Vertically Partitioned Data -- Privacy-Preserving Collaborative Association Rule Mining -- Privacy-Preserving Distributed k-Anonymity -- Towards Database Firewalls -- Complete Redundancy Detection in Firewalls -- A Comprehensive Approach to Anomaly Detection in Relational Databases -- An Authorization Architecture for Web Services -- Secure Model Management Operations for the Web -- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions -- Secure Mediation with Mobile Code -- Security Vulnerabilities in Software Systems: A Quantitative Perspective -- Trading Off Security in a Service Oriented Architecture -- Trusted Identity and Session Management Using Secure Cookies -- Security Issues in Querying Encrypted Data -- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
Altri titoli varianti Data and applications security 19
Data and applications security nineteen
19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Nineteenth Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Record Nr. UNINA-9910484814603321
Berlin ; ; New York, : Springer, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui