
Meer over het boek
The content covers a range of topics related to security, privacy, and efficiency in information systems. It discusses privacy-enhanced authorization policies and languages, along with the revocation of obligation and authorization policy objects. The concept of role slices for RBAC permission assignment and enforcement is introduced, alongside the design of secure indexes for encrypted databases. The trade-offs between efficiency and security in supporting range queries on these databases are explored, as well as verified query results from hybrid authentication trees. The text delves into multilevel secure teleconferencing over public networks and the secrecy of two-party secure computation. It addresses reliable scheduling of advanced transactions and privacy-preserving decision trees for vertically partitioned data. Collaborative association rule mining and distributed k-anonymity are also examined, along with the development of database firewalls and redundancy detection in firewalls. Anomalies in relational databases are tackled through a comprehensive detection approach, while an authorization architecture for web services is proposed. The document highlights secure model management operations, a credential-based method for resource sharing among dynamic coalitions, and secure mediation with mobile code. It also discusses security vulnerabilities in software systems from a quantitative perspective, security trade-of
Een boek kopen
Data and applications security XIX, Sushil Jajodia
- Taal
- Jaar van publicatie
- 2005
- product-detail.submit-box.info.binding
- (Paperback)
Betaalmethoden
Nog niemand heeft beoordeeld.