The 10 revised full papers presented were carefully reviewed and selected from 24 submissions for publication in the book. The topics in this volume range from traditional ones, such as access control and general database security, via provacy protection to new research directions, such as cryptographically enforded access control. The papers are organized in topical sections on database security, access control, and privacy protection.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.