You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.
The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. Databases are no longer stand-alone systems accessible only to internal users of organizations. Today, businesses must allow selective access from different security domains. New data services emerge every day, bringing complex challenges to those whose job is to protect data security. The Internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience, presenting threats and challenges of their own. This book identifies and addresses these new challenges and more, offering solid advice for practitioners and researchers in industry.
This book constitutes the refereed proceedings of the 10th International Conference on Database Systems for Advanced Applications, DASFAA 2005, held in Beijing, China in April 2005. The 67 revised full papers and 15 revised short papers presented were carefully reviewed and selected from 302 submissions. The papers are organized in topical sections on bioinformatics, water marking and encryption, XML query processing, XML coding and metadata management, data mining, data generation and understanding, music retrieval, query processing in subscription systems, extending XML, Web services, high-dimensional indexing, sensor and stream data processing, database performance, clustering and classification, data warehousing, data mining and Web data processing, moving object databases, temporal databases, semantics, XML update and query patterns, join processing and view management, spatial databases, enhancing database services, recovery and correctness, and XML databases and indexing.
This book constitutes the refereed proceedings of the 21 International Conference on Database and Expert Systems Applications, DEXA 2010, held in Bilbao, Spain, August 30 - September 3, 2010. The 45 revised full papers and 36 short papers were carefully reviewed and selected from 197 submissions. The papers are organized in topical sections on Web, Semantics and Ontologies, Information Integration and Process Modeling, Streams and Multimedia Databases, Data Management Algorithms and Performance, Decision Support Systems and Performance, Data Streams, XML Databases, Programming Language and Cooperative Work, Query Processing and Optimization, Data Privacy and Security, Temporal, Spatial, and High Dimensions Databases, Semantic Web and Ontologies.
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data...
This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised full papers presented together with an invited talk were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on access control, public key cryptography and cryptanalysis, security in distributed and mobile systems, cryptanalysis, authentication, fair exchange protocols, anonymity and privacy, software security, proxy cryptosystems, and intrusion detection systems.
This book constitutes the refereed proceedings of the 9th European Symposium on Research in Computer Security, ESORICS 2004, held in Sophia Antipolis, France in September 2004. The 27 revised full papers presented were carefully reviewed and selected from 159 submissions. Among the topics addressed are access control, authorization frameworks, privacy policies, security protocols, trusted computing, anonymity, information hiding, steganography, digital signature schemes, encrypted communication, information flow control, authentication, key distribution, public key cryptography, intrusion prevention, and attack discovery.
The 14th DEXA 2003 International Conference on Database and Expert - stems Applications was held during September 1–5, 2003 at the Czech Technical UniversityinPrague,CzechRepublic.TheDEXAlineofconferenceshasalready gained its own reputation and respected position as a platform for the exchange of ideas among theoreticians and practitioners in the wider area of computer science, but mainly in the areas of database and knowledge-based technologies. Since DEXA 1993, which was held in Prague, DEXA has grown into a m- ticonference consisting of four more focused and specialized conferences besides DEXA itself, namely the DaWak conference, EC-Web conference, eGOV c- ference, and this year happen...
This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Automation of RAS (SPIIRAS) in co- eration with Binghamton University (SUNY). The previous conferences in the series (MMM-ACNS 2001, MMM-ACNS 2003, MMM-ACNS 2005 and MMM-ACNS 2007) organized by SPIIRAS and Binghamton University (SUNY) demonstrated the great interest of the international scientific community in the theoretical and practical...
This book constitutes the refereed proceedings of the 8th International Conference on Information and Communications Security, ICICS 2006, held in Raleigh, NC, USA, December 2006. The 22 revised full papers and 17 revised short papers cover security protocols, applied cryptography, access control, privacy and malicious code, network security, systems security, cryptanalysis, applied cryptography and network security, and security implementations.