000 04069nam a22005535i 4500
001 978-0-387-48533-1
003 DE-He213
005 20170628033320.0
007 cr nn 008mamaa
008 100301s2008 xxu| s |||| 0|eng d
020 _a9780387485331
_9978-0-387-48533-1
024 7 _a10.1007/978-0-387-48533-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aGertz, Michael.
_eeditor.
245 1 0 _aHandbook of Database Security
_h[electronic resource] :
_bApplications and Trends /
_cedited by Michael Gertz, Sushil Jajodia.
264 1 _aBoston, MA :
_bSpringer US,
_c2008.
300 _bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aRecent Advances in Access Control -- Access Control Models for XML -- Access Control Policy Languages in XML -- Database Issues in Trust Management and Trust Negotiation -- Authenticated Index Structures for Outsourced Databases -- Towards Secure Data Outsourcing -- Managing and Querying Encrypted Data -- Security in Data Warehouses and OLAP Systems -- Security for Workflow Systems -- Secure Semantic Web Services -- Geospatial Database Security -- Security Re-engineering for Databases: Concepts and Techniques -- Database Watermarking for Copyright Protection -- Database Watermarking: A Systematic View -- Trustworthy Records Retention -- Damage Quarantine and Recovery in Data Processing Systems -- Hippocratic Databases: Current Capabilities and Future Trends -- Privacy-Preserving Data Mining: A Survey -- Privacy in Database Publishing: A Bayesian Perspective -- Privacy Preserving Publication: Anonymization Frameworks and Principles -- Privacy Protection through Anonymity in Location-based Services -- Privacy-enhanced Location-based Access Control -- Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment.
520 _aThe Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents the most comprehensive work on numerous data security aspects published in the last ten years. The Handbook of Database Security: Applications & Trends places a particular focus on data-centric security aspects that reach beyond traditional and well-studied data security aspects in databases. It also covers security in advanced database systems, data privacy and trust management, and data outsourcing, and outlines directions for future research in these fields. The Handbook of Database Security: Applications & Trends is designed for a professional audience composed of practitioners and researchers in industry and academia as a reference book. This volume is also suitable for advanced-level students in computer science interested in the state-of-the-art in data security.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aDatabase management.
650 0 _aInformation storage and retrieval systems.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aDatabase Management.
650 2 4 _aData Encryption.
650 2 4 _aInformation Storage and Retrieval.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Structures, Cryptology and Information Theory.
700 1 _aJajodia, Sushil.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387485324
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-48533-1
912 _aZDB-2-SCS
999 _c14635
_d14635