Leiss | Principles of Data Security | Buch | 978-1-4684-4318-9 | sack.de

Buch, Englisch, 238 Seiten, Format (B × H): 152 mm x 229 mm, Gewicht: 354 g

Reihe: Foundations of Computer Science

Leiss

Principles of Data Security


Softcover Nachdruck of the original 1. Auflage 1982
ISBN: 978-1-4684-4318-9
Verlag: Springer

Buch, Englisch, 238 Seiten, Format (B × H): 152 mm x 229 mm, Gewicht: 354 g

Reihe: Foundations of Computer Science

ISBN: 978-1-4684-4318-9
Verlag: Springer


With the greatly increased use of electronic media for processing and storing data, data security became an important practical issue. This is especially true for the extensively shared and distributed systems which are more and more being accepted in commercial operations. Essen­ tially, the problem is that of protecting data, including all the impli­ cations which this has to the end user as well as the systems or database designer. However, usually the term data security refers to protection by technical, i.e., computer science specific, means; if one wants to in­ clude issues such as physical security, how to select the group of people who should have authority to perform certain operations, etc., the term computer security is more appropriate. The object of this book is to provide technical solutions to (facets of) the problem of achieving data security. The reader who hopes to find clever recipes which allow circumventing protection mechanisms will, however, be sadly disappointed. In fact, we deliberately kept the presentation of the material at a fairly general level. While the short­ term benefit of such an approach may be somewhat smaller, we feel that without a thorough understanding of the fundamental issues and problems in data security there will never be secure systems. True, peo­ ple probably always considered certain security aspects when designing a system. However, an integrated approach is absolutely imperative.

Leiss Principles of Data Security jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


1. Data Security: Introduction and Motivation.- 2. Statistical Database Security.- 2.1. Introduction.- 2.2. Security with Characteristic-Specified Queries.- 2.3. Security in the Key-Specified Model.- 2.4. Conclusion.- 3. Authorization Mechanisms.- 3.1. Introduction.- 3.2. The Undecidability of the Safety Problem for General Authorization Systems.- 3.3. Authorization Systems with Tractable Safety Problem.- 3.4. Overview of a Practical Implementation.- 4. Cryptosystems.- 4.1. Introduction and Motivation.- 4.2. Symmetric Cryptosystems.- 4.3. Public Key Cryptosystems.- 4.4. Authentication and Digital Signatures.- 4.5. Protecting Ownership of Proprietary Data and Software.- References.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.