logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Data and Applications Security and Privacy XXVI: 26th Annual Ifip Wg 11.3 Conference, Dbsec 2012, Paris, France, July 11-13, 2012, Proceedings

Data and Applications Security and Privacy XXVI: 26th Annual Ifip Wg 11.3 Conference, Dbsec 2012, Paris, France, July 11-13, 2012, Proceedings (Paperback, 2012)

Frederic Cuppens, Joaquin Garcia-alfaro, Nora Cuppens-Boulahia (엮은이)
Springer
98,100원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
80,440원 -18% 0원
4,030원
76,410원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Data and Applications Security and Privacy XXVI: 26th Annual Ifip Wg 11.3 Conference, Dbsec 2012, Paris, France, July 11-13, 2012, Proceedings
eBook 미리보기

책 정보

· 제목 : Data and Applications Security and Privacy XXVI: 26th Annual Ifip Wg 11.3 Conference, Dbsec 2012, Paris, France, July 11-13, 2012, Proceedings (Paperback, 2012) 
· 분류 : 외국도서 > 컴퓨터 > 데이터베이스 관리 > 데이터 마이닝
· ISBN : 9783642315398
· 쪽수 : 340쪽
· 출판일 : 2012-07-01

목차

Invited Paper Logics for Security and Privacy.-Access Control A User-to-User Relationship-Based Access Control Model for Online Social Networks.-Automated and Efficient Analysis of Role-Based Access Control with Attributes.-A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC.-Confidentiality and Privacy.-Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies.-Privacy Consensus in Anonymization Systems via Game Theory .-Uniform Obfuscation for Location Privacy.-Smart Cards Security (Short Papers).-Security Vulnerabilities of User Authentication Scheme Using Smart Card.-Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.-A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard.-Privacy-Preserving Technologies.-Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.-Security Limitations of Using Secret Sharing for Data Outsourcing.-Privacy-Preserving Subgraph Discovery.-Data Management.-Decentralized Semantic Threat Graphs.-Code Type Revealing Using Experiments Framework.-From MDM to DB2: A Case Study of Security Enforcement Migration.-Intrusion and Malware.-XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks.-Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.-Probabilistic Attacks and Protection (Short Papers).-Layered Security Architecture for Masquerade Attack Detection.-k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.-Reconstruction Attack through Classifier Analysis.-Cloud Computing.-Distributed Data Federation without Disclosure of User Existence.-Improving Virtualization Security by Splitting Hypervisor into Smaller Components.-Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.-

저자소개

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책