The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security
Secure Data Management in Decentralized Systems
โ Scribed by Sushil Jajodia, Ting Yu (auth.), Ting Yu, Sushil Jajodia (eds.)
- Publisher
- Springer US
- Year
- 2007
- Tongue
- English
- Leaves
- 460
- Series
- Advances in Information Security 33
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business practices.
New data services are emerging every day, which also brings new challenges to protect data security. The internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience. Secure Data Management in Decentralized Systems identifies and addresses these new challenges. This volume presents a wide range of active areas, closely related to database security by distinguished leaders within this field. Solutions are included.
Secure Data Management in Decentralized Systems is designed for a professional audience composed of practitioners and researchers in industry. This book is suitable for graduate-level students in computer science as well.
โฆ Table of Contents
Front Matter....Pages I-VIII
Front Matter....Pages 1-1
Basic Security Concepts....Pages 3-20
Access Control Policies and Languages in Open Environments....Pages 21-58
Trusted Recovery....Pages 59-94
Front Matter....Pages 95-95
Access Control Policy Models for XML....Pages 97-126
Optimizing Tree Pattern Queries over Secure XML Databases....Pages 127-165
Front Matter....Pages 167-167
Rule-based Policy Specification....Pages 169-216
Automated Trust Negotiation in Open Systems....Pages 217-258
Building Trust and Security in Peer-to-Peer Systems....Pages 259-287
Front Matter....Pages 289-289
Microdata Protection....Pages 291-321
ฮบ -Anonymity....Pages 323-353
Preserving Privacy in On-line Analytical Processing Data Cubes....Pages 355-380
Front Matter....Pages 381-381
Search on Encrypted Data....Pages 383-425
Rights Assessment for Relational Data....Pages 427-457
Back Matter....Pages 459-462
โฆ Subjects
Database Management; Data Structures, Cryptology and Information Theory; Data Encryption; Computer Communication Networks; Information Storage and Retrieval; Information Systems Applications (incl.Internet)
๐ SIMILAR VOLUMES
The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. Databases are no longer stand-alone systems accessible only to internal users of organizations. Today, businesses must allow selective access from different security domains. New
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, open interconnected systems are much more vulnerable to a
<p>This book contributes to illustrating the methodological and technological issues of data management in Pervasive Systems by using the DataBenc project as the running case study for a variety of research contributions: sensor data management, user-originated data operation and reasoning, multimed
<span>This book takes readers through the sensational history of blockchains and their potential to revolutionize database systems of the future. In order to demystify blockchains, the book capitalizes on decades of research and field testing of existing database and distributed systems and applies
<p>The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses