Narrow your search

Library

KU Leuven (8)

VUB (6)

ULiège (5)

AP (4)

EhB (4)

KDG (4)

ULB (4)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

More...

Resource type

book (16)

digital (4)

audio (1)


Language

English (20)

Italian (1)


Year
From To Submit

2017 (2)

2014 (2)

2011 (1)

2010 (2)

2009 (6)

More...
Listing 1 - 10 of 21 << page
of 3
>>
Sort by

Book
Access control in data management systems
Author:
ISBN: 9781608453764 9781608453757 Year: 2010 Publisher: San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) Morgan & Claypool

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Access Control in Data Management Systems : A Visual Querying Perspective
Author:
ISBN: 3031018362 Year: 2010 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary, mandatory, and role-based access control will be discussed, by surveying the most relevant proposals and analyzing the benefits and drawbacks of each paradigm in view of the requirements of different application domains. Access control mechanisms provided by commercial Data Management Systems are presented and discussed. Finally, the last part of the book is devoted to discussion of some of the most challenging and innovative research trends in the area of access control, such as those related to the Web 2.0 revolution or to the Database as a Service paradigm. This book is a valuable reference for an heterogeneous audience. It can be used as either an extended survey for people who are interested in access control or as a reference book for senior undergraduate or graduate courses in data security with a special focus on access control. It is also useful for technologists, researchers, managers, and developers who want to know more about access control and related emerging trends. Table of Contents: Access Control: Basic Concepts / Discretionary Access Control for Relational Data Management Systems / Discretionary Access Control for Advanced Data Models / Mandatory Access Control / Role-based Access Control / Emerging Trends in Access Control.


Book
La casa piu'bella del mondo : concorso di architettura
Authors: ---
Year: 1994 Publisher: Reggio Emilia : Tecnograf,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Privacy-aware knowledge discovery: novel applications and new techniques
Authors: ---
ISBN: 9781439803653 Year: 2011 Publisher: Boca Raton, Fla CRC

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security and trust in online social networks
Authors: --- ---
ISBN: 9781627052665 9781627052658 Year: 2014 Publisher: San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) Morgan & Claypool

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Security and Trust in Online Social Networks
Authors: --- ---
ISBN: 3031023390 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields.

Spatial Data on the Web : Modeling and Management
Authors: --- --- ---
ISBN: 9783540698777 3540698779 3642089305 9786611043407 1281043400 3540698787 Year: 2007 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Spatial data is essential in a wide range of application domains today. While geographical applications remain the key target area, spatial properties are required in other contexts such as computer-aided design, robotics and image processing. Associated with these is the constantly growing number of distributed processing architectures, based on, for example, grid systems, sensor data networks, and personalized smart devices. Spatial Data on the Web links these two research streams, focusing on the modeling and management of spatial data in distributed systems. Belussi and his coeditors have structured the contributions from internationally renowned researchers into four parts. Part I presents models for representing semistructured, multiresolution and multiscale data; Part II deals with the integration of spatial data sources; Part III describes approaches to spatial data protection; and, finally, Part IV reports innovative applications for mobile devices. The book offers researchers in academia and industry an excellent overview of the state of the art in modeling and management of spatial data in distributed environments, while it may also be the basis of specialized courses on Web-based geographical information systems.

Keywords

Geospatial data --- Données géospatiales --- Computer network resources --- Information électronique --- Geographic information systems. --- Geospatial data. --- Spatial data infrastructures. --- Geographic information systems --- Web databases --- Spatial data infrastructures --- Geography-General --- Computer Science --- Geography --- Engineering & Applied Sciences --- Earth & Environmental Sciences --- Computer network resources. --- Données géospatiales --- Information électronique --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- SDIs (Geographic information systems) --- Data, Geospatial --- Geographical information systems --- GIS (Information systems) --- Computer science. --- Earth sciences. --- Database management. --- Information storage and retrieval. --- Application software. --- Geographical information systems. --- Computer Science. --- Database Management. --- Geographical Information Systems/Cartography. --- Earth Sciences, general. --- Information Storage and Retrieval. --- Computer Applications. --- Information storage and retrieval systems --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Geosciences --- Environmental sciences --- Physical sciences --- Informatics --- Science --- Geography. --- Information storage and retrieva. --- Cosmography --- Earth sciences --- World history --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval


Book
Privacy, Security, and Trust in KDD : Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 3642017177 3642017185 Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008. The 5 revised full papers presented together with 1 invited keynote lecture and 2 invited panel sessions were carefully reviewed and selected from numerous submissions. The papers are extended versions of the workshop presentations and incorporate reviewers' comments and discussions at the workshop and represent the diversity of data mining research issues in privacy, security, and trust as well as current work on privacy issues in geographic data mining.

Keywords

Data protection --- Internet --- Data mining --- Privacy, Right of --- Computer Science --- Engineering & Applied Sciences --- Security measures --- DARPA Internet --- Internet (Computer network) --- Computer science. --- Computer communication systems. --- Computer security. --- Data mining. --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Data Mining and Knowledge Discovery. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Distributed processing --- Wide area networks (Computer networks) --- World Wide Web --- Law and legislation --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Trust management III : third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009 : proceedings
Authors: --- ---
ISBN: 3642020550 3642020569 Year: 2009 Publisher: Germany : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.

Keywords

Computer systems -- Reliability -- Congresses. --- Trust -- Management -- Congresses. --- Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Computer Science --- Engineering & Applied Sciences --- Reliability --- Access control --- Security measures --- Management --- Trust (Psychology) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Application software. --- E-commerce. --- Computer Science. --- Computer Applications. --- Coding and Information Theory. --- Data Encryption. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- e-Commerce/e-business. --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Attitude (Psychology) --- Emotions --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Information theory. --- Communication theory --- Communication --- Cybernetics


Digital
Spatial Data on the Web : Modeling and Management
Authors: --- --- ---
ISBN: 9783540698784 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 21 << page
of 3
>>
Sort by