Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Confe
User Rating: Be the first one!
Author: IFIP TC11/WG11.3 Annual Working Conference on Data and Applications Security (17th : 2003 : Estes Park, Col.), De Capitani di Vimercati, Sabrina, Ray, Indrakshi, Ray, Indrajit
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Database security
Publishers: Boston : Kluwer Academic Publishers
Collections: folkscanomy miscellaneous, folkscanomy, additional collections
ISBN Number: 1402080697, 1402080700
Pages Count: 112
PPI Count: 112
PDF Count: 1
Total Size: 91.54 MB
PDF Size: 18.37 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 1.17K
Views: 51.17
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 b116220 archive torrent
Last Modified: 2022-03-09 09:14:59
Download
Size: 7.56 KB
Description
Data and Applications Security XVII: Status and Prospects
Author: Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray
Published by Springer US
ISBN: 978-1-4020-8069-2
DOI: 10.1007/b116220
Table of Contents:
Includes bibliographical references and index
Author: Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray
Published by Springer US
ISBN: 978-1-4020-8069-2
DOI: 10.1007/b116220
Table of Contents:
- Remote Computer Fingerprinting for Cyber Crime Investigations
- Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases
- Delivering Services with Integrity Guarantees in Survivable Database Systems
- Certifying Data from Multiple Sources
- Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model
- Adapting Query Optimization Techniques for Efficient Alert Correlation
- Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases
- Privacy Under Conditions of Concurrent Interaction with Multiple Parties
- Correlated Data Inference
- Anti-Tamper Databases
- Administration Rights in the SDSD-System
- Secure Authorisation for Web Services
- A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities
- Supporting Delegation in Secure Workflow Management Systems
- Modifying LDAP to Support PKI
- ECPV: EFficient Certificate Path Validation in Public-Key Infrastructure
- Semantics-Aware Perimeter Protection
- Systematic Development of a Family of Fair Exchange Protocols
- High-Speed Access Control for XML Documents
- Chinese Wall Security Policy Models
Includes bibliographical references and index
You May Also Like
We will be happy to hear your thoughts