Data and applications security and p...
Samarati, Pierangela.

FindBook      Google Book      Amazon      博客來     
  • Data and applications security and privacy XXIX = 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015 : proceedings /
  • 紀錄類型: 書目-語言資料,印刷品 : Monograph/item
    正題名/作者: Data and applications security and privacy XXIX/ edited by Pierangela Samarati.
    其他題名: 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015 : proceedings /
    其他題名: Data and applications security and privacy 39
    其他作者: Samarati, Pierangela.
    出版者: Cham :Springer International Publishing : : 2015.,
    面頁冊數: xi, 364 p. :ill., digital ;24 cm.
    內容註: MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data.
    Contained By: Springer eBooks
    標題: Computer security - Fiction. -
    電子資源: http://dx.doi.org/10.1007/978-3-319-20810-7
    ISBN: 9783319208107 (electronic bk.)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9273289 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 A615 2015 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入