logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Data and Applications Security XXI: 21st Annual Ifip Wg 11.3 Working Conference on Data and Applications Security, Redondo Beach, Ca, Usa, July 8-11,

Data and Applications Security XXI: 21st Annual Ifip Wg 11.3 Working Conference on Data and Applications Security, Redondo Beach, Ca, Usa, July 8-11, (Paperback, 2007)

Steve Barker, Gail-joon Ahn (엮은이)
Springer-Verlag New York Inc
118,340원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
97,030원 -18% 0원
4,860원
92,170원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Data and Applications Security XXI: 21st Annual Ifip Wg 11.3 Working Conference on Data and Applications Security, Redondo Beach, Ca, Usa, July 8-11,
eBook 미리보기

책 정보

· 제목 : Data and Applications Security XXI: 21st Annual Ifip Wg 11.3 Working Conference on Data and Applications Security, Redondo Beach, Ca, Usa, July 8-11, (Paperback, 2007) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9783540735335
· 쪽수 : 293쪽
· 출판일 : 2007-06-22

목차

Secure Query Evaluation.- Confidentiality Policies for Controlled Query Evaluation.- Provably-Secure Schemes for Basic Query Support in Outsourced Databases.- Authenticated Relational Tables and Authenticated Skip Lists.- Location-Based Security/Mobile Security.- Location Privacy Protection Through Obfuscation-Based Techniques.- Efficient Security Policy Enforcement in a Location Based Service Environment.- Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.- Short Papers.- Privacy-Preserving Schema Matching Using Mutual Information.- The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers.- Distributed Security Issues.- Measuring the Overall Security of Network Configurations Using Attack Graphs.- Enforcing Honesty in Assured Information Sharing Within a Distributed System.- A Privacy-Enhanced Attribute-Based Access Control System.- Cryptographic-Based Security.- A Scalable and Secure Cryptographic Service.- gVault: A Gmail Based Cryptographic Network File System.- Design and Analysis of Querying Encrypted Data in Relational Databases.- Temporal Access Control and Usage Control.- Dynamic Event-Based Access Control as Term Rewriting.- A Spatio-temporal Role-Based Access Control Model.- Towards a Times-Based Usage Control Model.- System Security Issues.- New Paradigm of Inference Control with Trusted Computing.- Security Patterns for Physical Access Control Systems.- XACML Policies for Exclusive Resource Usage.

저자소개

Steve Barker (엮은이)    정보 더보기
펼치기
Gail-joon Ahn (엮은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책