Buch, Englisch, 577 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 885 g
Applications and Trends
Buch, Englisch, 577 Seiten, Previously published in hardcover, Format (B × H): 155 mm x 235 mm, Gewicht: 885 g
ISBN: 978-1-4419-4305-7
Verlag: Springer US
This handbook provides an up-to-date overview of data security models, techniques, and architectures for a variety of data management applications and settings. In addition, the book outlines future research directions for the field. Edited by world renowned leaders in data security, the handbook emphasizes aspects of data centric security that reach beyond traditional and well known approaches. SQL standards and security in commercial and open-source database management systems are all covered in detail. In addition to researchers in industry and academia, the treatment is highly suited for advanced-level students in computer science.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
Weitere Infos & Material
Recent Advances in Access Control.- Access Control Models for XML.- Access Control Policy Languages in XML.- Database Issues in Trust Management and Trust Negotiation.- Authenticated Index Structures for Outsourced Databases.- Towards Secure Data Outsourcing.- Managing and Querying Encrypted Data.- Security in Data Warehouses and OLAP Systems.- Security for Workflow Systems.- Secure Semantic Web Services.- Geospatial Database Security.- Security Re-engineering for Databases: Concepts and Techniques.- Database Watermarking for Copyright Protection.- Database Watermarking: A Systematic View.- Trustworthy Records Retention.- Damage Quarantine and Recovery in Data Processing Systems.- Hippocratic Databases: Current Capabilities and Future Trends.- Privacy-Preserving Data Mining: A Survey.- Privacy in Database Publishing: A Bayesian Perspective.- Privacy Preserving Publication: Anonymization Frameworks and Principles.- Privacy Protection through Anonymity in Location-based Services.- Privacy-enhanced Location-based Access Control.- Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment.