In this blog, 25.000 books will be uploaded, so far more than 1400 books are available. Books, will be added daily, please check this blog daily.
Friday, June 8, 2012
Handbook of Database Security Applications and Trends
Michael Gertz
University of California at Davis
USA
Sushil Jajodia
George Mason University
USA
Contents
1 Recent Advances in Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
2 Access Control Models for XML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, and
Pierangela Samarati
3 Access Control Policy Languages in XML . . . . . . . . . . . . . . . . . . . . . . . 55
Naizhen Qi and Michiharu Kudo
4 Database Issues in Trust Management and Trust Negotiation . . . . . . . 73
Dongyi Li, William Winsborough, Marianne Winslett and Ragib Hasan
5 Authenticated Index Structures for Outsourced Databases . . . . . . . . . 115
Feifei Li, Marios Hadjileftheriou, George Kollios, and Leonid Reyzin
6 Towards Secure Data Outsourcing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Radu Sion
7 Managing and Querying Encrypted Data . . . . . . . . . . . . . . . . . . . . . . . 163
Bijit Hore, Sharad Mehrotra, and Hakan Hacıg¨um¨us¸
8 Security in Data Warehouses and OLAP Systems . . . . . . . . . . . . . . . . . 191
Lingyu Wang and Sushil Jajodia
9 Security for Workflow Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Vijayalakshmi Atluri and Janice Warner
10 Secure Semantic Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Bhavani Thuraisingham
11 Geospatial Database Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Soon Ae Chun and Vijayalakshmi Atluri
12 Security Re-engineering for Databases: Concepts and Techniques . . . 267
Michael Gertz and Madhavi Gandhi
13 Database Watermarking for Copyright Protection . . . . . . . . . . . . . . . . 297
Radu Sion
14 Database Watermarking: A Systematic View . . . . . . . . . . . . . . . . . . . . 329
Yingjiu Li
15 Trustworthy Records Retention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Ragib Hasan, Marianne Winslett, Soumyadeb Mitra, Windsor Hsu, and
Radu Sion
16 Damage Quarantine and Recovery in Data Processing Systems . . . . . 383
Peng Liu, Sushil Jajodia, and Meng Yu
17 Hippocratic Databases: Current Capabilities and Future Trends . . . . 409
Tyrone Grandison, Christopher Johnson, and Jerry Kiernan
18 Privacy-Preserving Data Mining: A Survey . . . . . . . . . . . . . . . . . . . . . . 431
Charu C. Aggarwal and Philip S. Yu
19 Privacy in Database Publishing: A Bayesian Perspective . . . . . . . . . . . 461
Alin Deutsch
20 Privacy Preserving Publication: Anonymization Frameworks and
Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Yufei Tao
21 Privacy Protection through Anonymity in Location-based Services . . 509
Claudio Bettini, Sergio Mascetti, and X. Sean Wang
22 Privacy-enhanced Location-based Access Control . . . . . . . . . . . . . . . . 531
Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di
Vimercati, and Pierangela Samarati
23 Efficiently Enforcing the Security and Privacy Policies in a Mobile
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Vijayalakshmi Atluri and Heechang Shin
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Other Database Books
Database Systems The Complete Book
Hacking Exposed Linux Linux Security Secrets & Solutions
Other Computer Security Books
Database security - Wikipedia, the free encyclopedia
Database Security
Download
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment