𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security of Data and Transaction Processing

✍ Scribed by Vijay Atluri, Pierangela Samarati (auth.), Vijay Atluri, Pierangela Samarati (eds.)


Publisher
Springer US
Year
2000
Tongue
English
Leaves
143
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area.
Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

✦ Table of Contents


Front Matter....Pages i-3
Guest Editor’s Introduction....Pages 5-6
Rewriting Histories: Recovering from Malicious Transactions....Pages 7-40
Secure Concurrency Control in Firm Real-Time Database Systems....Pages 41-83
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments....Pages 85-117
Providing Security and Interoperation of Heterogeneous Systems....Pages 119-145

✦ Subjects


Management of Computing and Information Systems; Data Structures, Cryptology and Information Theory; Document Preparation and Text Processing; Information Storage and Retrieval


πŸ“œ SIMILAR VOLUMES


Multilevel Secure Transaction Processing
✍ Vijay Atluri, Sushil Jajodia, Binto George (auth.) πŸ“‚ Library πŸ“… 2000 πŸ› Springer US 🌐 English

<p>Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A <em>multilevel secure database management system</em> (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory securit

Transactions on Data Hiding and Multimed
✍ Angela Piper, Reihaneh Safavi-Naini (auth.), Yun Q. Shi (eds.) πŸ“‚ Library πŸ“… 2009 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding a

Transactions on Data Hiding and Multimed
✍ Jana Dittmann, David MegΓ­as, Andreas Lang (auth.), Yun Q. Shi (eds.) πŸ“‚ Library πŸ“… 2006 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding a

Transactions on Data Hiding and Multimed
✍ Angela Piper, Reihaneh Safavi-Naini (auth.), Yun Q. Shi (eds.) πŸ“‚ Library πŸ“… 2009 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding a