Sold Out
Book Categories |
Remote computer fingerprinting for cyber crime investigations | 3 | |
Improving damage assessment efficacy in case of frequent attacks on databases | 16 | |
Delivering services with integrity guarantees in survivable database systems | 33 | |
Certifying data from multiple sources | 47 | |
Ensuring the integrity of encrypted databases in the database-as-a-service model | 61 | |
Adapting query optimization techniques for efficient alert correlation | 75 | |
Collaborative privacy preserving frequent item set mining in vertically partitioned databases | 91 | |
Privacy under conditions of concurrent interaction with multiple parties | 105 | |
Correlated data inference | 119 | |
Anti-tamper databases : querying encrypted databases | 133 | |
Administration rights in the SDSD-system | 149 | |
Secure authorisation for Web services | 163 | |
A decentralized approach for controlled sharing of resources in virtual communities | 176 | |
Supporting delegation in secure workflow management systems | 190 | |
Modifying LDAP to support PKI | 205 | |
ECPV : efficient certificate path validation in public-key infrastructure | 215 | |
Semantics-aware perimeter protection | 229 | |
Systematic development of a family of fair exchange protocols | 243 | |
High-speed access control for XML documents | 261 | |
Chinese wall security policy models : information flows and confining trojan horses | 275 | |
RBAC policy implementation for SQL databases | 288 | |
An administrative model for role graphs | 302 | |
Safety and liveness for an RBAC/MAC security model | 316 | |
Schema based XML security : RBAC approach | 330 | |
Persistent versus dynamic role membership | 344 | |
FlexFlow : a flexible flow control policy specification framework | 358 | |
Data and applications security : past, present and the future | 375 | |
Digital forensics : operational, legal, and research issues | 393 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionData and Applications Security XVII
X
This Item is in Your InventoryData and Applications Security XVII
X
You must be logged in to review the productsX
X
X
Add Data and Applications Security XVII, Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication, Data and Applications Security XVII to the inventory that you are selling on WonderClubX
X
Add Data and Applications Security XVII, Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication, Data and Applications Security XVII to your collection on WonderClub |