Data and Applications Security XX數(shù)據(jù)與應(yīng)用安全 XX

出版時間:2006-8  出版社:1 (2006年8月29日)  作者:Ernesto Damiani  頁數(shù):317  

內(nèi)容概要

he LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community,with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available.    The scope of LNCS, including its subseries LNAI and LNBI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes    -proceedings (published in time for the respective conference)    -post-proceedings (consisting of thoroughly revised final full papers)    -research monographs (which may be based on outstanding PhD work,research projects, technical reports, etc.)

書籍目錄

Creating Objects in the Flexible Authorization FrameworkDetection and Resolution of Anomalies in Firewall Policy RulesOn Finding an Inference-Proof Complete Database for Controlled Query EvaluationConsolidating the Access Control of Composite Applications and Workflows                          Authenticating Multi-dimensional Query Results in Data PublishingXML Streams WatermarkingAggregation Queries in the Database-As-a-Service ModelPolicy Classes and Query Rewriting Algorithm for XML Security ViewsInteractive Analysis of Attack Graphs Using Relational QueriesNotarized Federated Identity Management for Web ServicesResolving Information Flow Conflicts in RBAC SystemsPolicy Transformations for Preventing Leakage of Sensitive Information in Email SystemsTerm Rewriting for Access ControlDiscretionary and Mandatory Controls for Role-Based AdministrationA Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented ApproachEnhancing User Privacy Through Data Handling PoliciesEfficient Enforcement of Security Policies Based on Tracking of Mobile UsersA Framework for Flexible Access Control in Digital Library SystemsAuthrule: A Generic Rule-Based Authorization ModuleAspect-Oriented Risk Driven Development of Secure ApplicationsFrom Business Process Choreography to Authorization PoliciesInformation Theoretical Analysis of Two-Party Secret ComputationAuthor Index

圖書封面

評論、評分、閱讀與下載


    Data and Applications Security XX數(shù)據(jù)與應(yīng)用安全 XX PDF格式下載


用戶評論 (總計0條)

 
 

 

250萬本中文圖書簡介、評論、評分,PDF格式免費(fèi)下載。 第一圖書網(wǎng) 手機(jī)版

京ICP備13047387號-7