Listing 1 - 10 of 36 | << page >> |
Sort by
|
Choose an application
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems are much more vulnerable to attacks and unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy. In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect to security, privacy and trust. After the introductory part that offers a perspective on privacy and security issues in the modern digital world, the contributions from leading researchers are grouped into sections on data and system security, privacy-enhancing techniques, digital asset protection, and selected topics on privacy and security in ambient intelligence. Overall, the book delivers, from information on the ethical and legislative background, to chapters on the state-of-the-art technologies such as access control, identity management and digital rights management to advice on implementing fair information practices and preventing security and privacy violations. With this broad approach, this book appeals equally to researchers and graduate students looking for an overview of this area of ever-growing importance and to professional developers who require sound theoretical grounds for the design and implementation of secure privacy-preserving ubiquitous applications.
Database management. --- Database security. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data base security --- Databases --- Computer security --- Security measures --- Computer security. --- Data structures (Computer scienc. --- Systems and Data Security. --- Data Structures and Information Theory. --- Database Management. --- Information Systems Applications (incl. Internet). --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Data structures (Computer science). --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.
Cloud computing. --- Computer security. --- Database management. --- Computer science. --- Data encryption (Computer science). --- Systems and Data Security. --- Database Management. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Cryptology. --- Informatics --- Science --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Computers and civilization. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization
Choose an application
Choose an application
Choose an application
Computer science --- Information systems --- ICT (informatie- en communicatietechnieken) --- cryptologie --- informatiesystemen --- database management --- programmatielogica
Choose an application
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- DES (data encryption standard) --- informatica --- maatschappij --- computerbesturingssystemen --- database management --- informatica management --- OS (operating system)
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- DES (data encryption standard) --- informatica --- maatschappij --- informatiesystemen --- informatica management --- computernetwerken
Choose an application
Choose an application
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- computers --- informatica --- maatschappij --- informatiesystemen --- database management --- computerbeveiliging --- computerkunde
Listing 1 - 10 of 36 | << page >> |
Sort by
|