Amazing Books
Temporary Blank

Friday, June 8, 2012

Handbook of Database Security Applications and Trends






Michael Gertz
University of California at Davis
USA
Sushil Jajodia
George Mason University
USA

Contents
1 Recent Advances in Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
2 Access Control Models for XML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, and
Pierangela Samarati
3 Access Control Policy Languages in XML . . . . . . . . . . . . . . . . . . . . . . . 55
Naizhen Qi and Michiharu Kudo
4 Database Issues in Trust Management and Trust Negotiation . . . . . . . 73
Dongyi Li, William Winsborough, Marianne Winslett and Ragib Hasan
5 Authenticated Index Structures for Outsourced Databases . . . . . . . . . 115
Feifei Li, Marios Hadjileftheriou, George Kollios, and Leonid Reyzin
6 Towards Secure Data Outsourcing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Radu Sion
7 Managing and Querying Encrypted Data . . . . . . . . . . . . . . . . . . . . . . . 163
Bijit Hore, Sharad Mehrotra, and Hakan Hacıg¨um¨us¸
8 Security in Data Warehouses and OLAP Systems . . . . . . . . . . . . . . . . . 191
Lingyu Wang and Sushil Jajodia
9 Security for Workflow Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Vijayalakshmi Atluri and Janice Warner
10 Secure Semantic Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Bhavani Thuraisingham
11 Geospatial Database Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Soon Ae Chun and Vijayalakshmi Atluri
12 Security Re-engineering for Databases: Concepts and Techniques . . . 267
Michael Gertz and Madhavi Gandhi
13 Database Watermarking for Copyright Protection . . . . . . . . . . . . . . . . 297
Radu Sion
14 Database Watermarking: A Systematic View . . . . . . . . . . . . . . . . . . . . 329
Yingjiu Li
15 Trustworthy Records Retention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Ragib Hasan, Marianne Winslett, Soumyadeb Mitra, Windsor Hsu, and
Radu Sion
16 Damage Quarantine and Recovery in Data Processing Systems . . . . . 383
Peng Liu, Sushil Jajodia, and Meng Yu
17 Hippocratic Databases: Current Capabilities and Future Trends . . . . 409
Tyrone Grandison, Christopher Johnson, and Jerry Kiernan
18 Privacy-Preserving Data Mining: A Survey . . . . . . . . . . . . . . . . . . . . . . 431
Charu C. Aggarwal and Philip S. Yu
19 Privacy in Database Publishing: A Bayesian Perspective . . . . . . . . . . . 461
Alin Deutsch
20 Privacy Preserving Publication: Anonymization Frameworks and
Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Yufei Tao
21 Privacy Protection through Anonymity in Location-based Services . . 509
Claudio Bettini, Sergio Mascetti, and X. Sean Wang
22 Privacy-enhanced Location-based Access Control . . . . . . . . . . . . . . . . 531
Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di
Vimercati, and Pierangela Samarati
23 Efficiently Enforcing the Security and Privacy Policies in a Mobile
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Vijayalakshmi Atluri and Heechang Shin
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575

Other Database Books
Database Systems The Complete Book
Hacking Exposed Linux Linux Security Secrets & Solutions
Other Computer Security Books
Database security - Wikipedia, the free encyclopedia
Database Security
Download

No comments:

Post a Comment

Related Posts with Thumbnails
There was an error in this gadget

Put Your Ads Here!
There was an error in this gadget