Data and Applications Security XIX (eBook, PDF)
19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings
Redaktion: Jajodia, Sushil; Wijesekera, Duminda
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Data and Applications Security XIX (eBook, PDF)
19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings
Redaktion: Jajodia, Sushil; Wijesekera, Duminda
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 4.48MB
Andere Kunden interessierten sich auch für
- Data and Applications Security XX (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Data and Applications Security XXI (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Information Security (eBook, PDF)40,95 €
-
-
-
Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 353
- Erscheinungstermin: 25. August 2005
- Englisch
- ISBN-13: 9783540319375
- Artikelnr.: 44227797
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Sushil Jajodia, George Mason University, Fairfax, USA / Duminda Wijesekera, George Mason University, Fairfax, USA
Streams, Security and Scalability.- Towards Privacy-Enhanced Authorization Policies and Languages.- Revocation of Obligation and Authorisation Policy Objects.- Role Slices: A Notation for RBAC Permission Assignment and Enforcement.- Designing Secure Indexes for Encrypted Databases.- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.- Verified Query Results from Hybrid Authentication Trees.- Multilevel Secure Teleconferencing over Public Switched Telephone Network.- Secrecy of Two-Party Secure Computation.- Reliable Scheduling of Advanced Transactions.- Privacy-Preserving Decision Trees over Vertically Partitioned Data.- Privacy-Preserving Collaborative Association Rule Mining.- Privacy-Preserving Distributed k-Anonymity.- Towards Database Firewalls.- Complete Redundancy Detection in Firewalls.- A Comprehensive Approach to Anomaly Detection in Relational Databases.- An Authorization Architecture for Web Services.- Secure Model Management Operations for the Web.- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.- Secure Mediation with Mobile Code.- Security Vulnerabilities in Software Systems: A Quantitative Perspective.- Trading Off Security in a Service Oriented Architecture.- Trusted Identity and Session Management Using Secure Cookies.- Security Issues in Querying Encrypted Data.- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.
Streams, Security and Scalability.- Towards Privacy-Enhanced Authorization Policies and Languages.- Revocation of Obligation and Authorisation Policy Objects.- Role Slices: A Notation for RBAC Permission Assignment and Enforcement.- Designing Secure Indexes for Encrypted Databases.- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases.- Verified Query Results from Hybrid Authentication Trees.- Multilevel Secure Teleconferencing over Public Switched Telephone Network.- Secrecy of Two-Party Secure Computation.- Reliable Scheduling of Advanced Transactions.- Privacy-Preserving Decision Trees over Vertically Partitioned Data.- Privacy-Preserving Collaborative Association Rule Mining.- Privacy-Preserving Distributed k-Anonymity.- Towards Database Firewalls.- Complete Redundancy Detection in Firewalls.- A Comprehensive Approach to Anomaly Detection in Relational Databases.- An Authorization Architecture for Web Services.- Secure Model Management Operations for the Web.- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.- Secure Mediation with Mobile Code.- Security Vulnerabilities in Software Systems: A Quantitative Perspective.- Trading Off Security in a Service Oriented Architecture.- Trusted Identity and Session Management Using Secure Cookies.- Security Issues in Querying Encrypted Data.- Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption.