logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Research Directions in Data and Applications Security XVIII: Ifip Tc11 / Wg11.3 Eighteenth Annual Conference on Data and Applications Security July 25

Research Directions in Data and Applications Security XVIII: Ifip Tc11 / Wg11.3 Eighteenth Annual Conference on Data and Applications Security July 25 (Hardcover, 2004)

Pierangela Samarati, Csilla Farkas (엮은이)
Kluwer Academic Pub
207,470원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
170,120원 -18% 0원
8,510원
161,610원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Research Directions in Data and Applications Security XVIII: Ifip Tc11 / Wg11.3 Eighteenth Annual Conference on Data and Applications Security July 25
eBook 미리보기

책 정보

· 제목 : Research Directions in Data and Applications Security XVIII: Ifip Tc11 / Wg11.3 Eighteenth Annual Conference on Data and Applications Security July 25 (Hardcover, 2004) 
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 공학
· ISBN : 9781402081279
· 쪽수 : 385쪽
· 출판일 : 2004-07-15

목차

Preface. Conference Organization. Contributing Authors. I: Invited Talk I. Invited Talk - Inference Control Problem in Statistical Database Query Systems; L.H. Cox. II: Access Control. Attribute Mutability in Usage Control; Jaehong Park, et al. Star Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations; V. Alturi, Qui Guo. An Extended Analysis of Delegating Obligations; A. Schaad. Implementing Real-Time Update of Access Control Policies; I. Rai, Tai Xin. III: Data Protection Techniques. Defending against Additive Attacks with Maximal Errors in Watermarking Relational Databases; Jingjui Li, et al. Performance-Conscious Key Management in Encrypted Databases; H. Hacigumus, S. Mehrotra. Damage Discovery in Distributed Database Systems; Yanjun Zuo, B. Panda. IV: Database Theory and Inference Control. Information Flow Analysis for File Systems and Databases Using Labels; E. Gudes, et al. Refusal in Incomplete Databases; J. Biskup, T. Weibert. Why is This User Asking so Many Questions? Explaining Sequences of Queries; A.C. Acar, A. Motro. V: Invited Talk II. Invited Talk - Towards Semantics-Aware Access Control; E. Damiani, S. De Capitani-de Vimercati. VI: System Security Analysis. RBAC/MAC Security for UML; T. Doan, et al. Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones; I. Youn, D. Wijesekera. VII: Access Control Design and Management. Policy-based Security Management for Enterprise Systems; R. Mukkamala, et al. A Pattern System for Access Control; T. Priebe, et al. A Design for Parameterized Roles; Mei Ge, S.L. Osborn.VIII: Distributed Systems. Efficient Verification of Delegation in Distributive Group Membership Management; L. Huraj, H. Reiser. Web Resource Usage Control in RSCLP; S. Barker. Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation; I. Ray T. Hajek. IX: Privacy. On the Damage and Compensation of Privacy Leakage; Da-Wei Wang, et al. An Experimental Study of Distortion-Based Techniques for Association Rule Hiding; E.D. Pontikakis, et al. Privacy-Preserving Multi-Party Decision Tree Induction; J.Z. Zhan, et al. X: Network Protection and Configuration. Configuring Storage Area Networks for Mandatory Security; B. Aziz, et al. A Framework for Trusted Wireless Networks; J.S. Park, A. Jain. Author Index.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책