Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats.
Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include:
-Information Warfare,
-Information Assurance,
-Security and Privacy,
-Authorization and Access Control in Distributed Systems,
-Security Technologies for the Internet,
-Access Control Models and Technologies,
-Digital Forensics.
This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security.
Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Contributing Authors. Preface. Conference Committees. One: Information Warfare. Remote Computer Fingerprinting for Cyber Crime Investigations; J. Novotny, et al. Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases; P. Ragothaman, B. Panda. Two: Information Assurance. Delivering Services with Integrity Guarantees in Survivable Database Systems; Jianyong Zhang, Peng Liu. Certifying Data from Multiple Sources; G. Nuckolls, et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model; H. Hacigümüs, et al. Adapting Query Optimization Techniques for Efficient Alert Correlation; Peng Ning, Dingbang Xu. Three: Security and Privacy. Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases; E. Gudes, B. Rozenberg. Privacy under Conditions of Concurrent Interaction with Multiple Parties; M.S. Oliver. Correlated Data Inference; C. Farkas, A.G. Stoica. Anti-Tamper Databases: Querying Encrypted Databases; G. Ozsoyoglu, et al. Four: Authorization and Access Control in Distributed Systems. Administration Rights in the SDSD-System; J. Biskup, et al. Secure Authorization for Web Services; S. Indrakanti, et al. A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities; E. Bertino, et al. Supporting Delegation in Secure Workflow Management Systems; V. Atluri, et al. Five: Security Technologies for the Internet. Modifying LDAP to Support PKI; D.W. Chadwick, et al. ECPV: Efficient Certificate Path Validation in Public-Key Infrastructure; M. Halappanavar, R. Mukkamala. Semantics-Aware PerimeterProtection; M. Cremonini, et al. Systematic Development of a Family of Fair Exchange Protocols; P.D. Ezhilchelvan, S.K. Shrivastava. Six: Access Control Models and Technologies. High-Speed Access Control for XML Documents; Jong P. Yoon. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses; Tsau Young Lin. RBAC Policy Implementation for SQL Databases; S. Barker, P. Douglas. An Administrative Model for Role Graphs; He Wang, S.L. Osborne. Safety and Liveness for an RBAC/MAC Security Model; C. Phillips, et al. Schema-Based XML Security: RBAC Approach; Xinwen Zhang, et al. Persistent versus Dynamic Role Membership; J. Bacon, et al. FlexFlow: A Flexible Flow Control Policy Specification Framework; Shiping Chen, et al. Seven: Key Note. Data and Applications Security: Past, Present and Future; B. Thuraisingham. Eight: Panel. Digital Forensics: Operational, Legal and Research Issues; M. Pollitt, et al.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 4,66 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiGRATIS per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: Phatpocket Limited, Waltham Abbey, HERTS, Regno Unito
Condizione: Good. Used - Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre.' Ex-library, but has been well cared for. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Codice articolo Z1-L-010-00578
Quantità: 1 disponibili
Da: DFTP Holdings, DAYTON, OH, U.S.A.
Hardcover. Condizione: Good. Used Texts May Have Used Book Stickers on the Cover. Used texts may NOT contain supplemental materials such as CD's, info-trac, access codes, etc. Satisfaction Guaranteed! Codice articolo 2005607
Quantità: 1 disponibili
Da: Basi6 International, Irving, TX, U.S.A.
Condizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Codice articolo ABEJUNE24-168008
Quantità: 1 disponibili
Da: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condizione: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Codice articolo ABNR-84469
Quantità: 1 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 428. Codice articolo 263066955
Quantità: 1 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. pp. 428 52:B&W 6.14 x 9.21in or 234 x 156mm (Royal 8vo) Case Laminate on White w/Gloss Lam. Codice articolo 5862292
Quantità: 1 disponibili
Da: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. pp. 428. Codice articolo 183066945
Quantità: 1 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781402080692_new
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Buch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector. 428 pp. Englisch. Codice articolo 9781402080692
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Buch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector. Codice articolo 9781402080692
Quantità: 1 disponibili