- Shopping Bag ( 0 items )
Other sellers (Hardcover)
-
All (6) from $61.01
-
New (5) from $105.24
-
Used (1) from $61.01
More About This Textbook
Overview
The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. Databases are no longer stand-alone systems accessible only to internal users of organizations. Today, businesses must allow selective access from different security domains. New data services emerge every day, bringing complex challenges to those whose job is to protect data security. The Internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience, presenting threats and challenges of their own. This book identifies and addresses these new challenges and more, offering solid advice for practitioners and researchers in industry.
Editorial Reviews
From the Publisher
From the reviews:"Secure data management in decentralized systems is addressed in this book. … This book should appeal to researchers and graduate students who want to acquire in-depth knowledge of information security and its extension to distributed database systems. After reading the book closely, one will have a better understanding of the new set of issues and the complexity of securing distributed data in emerging environments." (Jean-Pierre Kuilboer, ACM Computing Reviews, Vol. 49 (4), April, 2008)
Product Details
Related Subjects
Table of Contents
Foundation.- Basic Security Concepts.- Access Control Policies and Languages in Open Environments.- Trusted Recovery.- Access Control for Semi-Structured Data.- Access Control Policy Models for XML.- Optimizing Tree Pattern Queries over Secure XML Databases.- Distributed Trust Management.- Rule-based Policy Specification.- Automated Trust Negotiation in Open Systems.- Building Trust and Security in Peer-to-Peer Systems.- Privacy in Cross-Domain Information Sharing.- Microdata Protection.-—-Anonymity.- Preserving Privacy in On-line Analytical Processing Data Cubes.- Security in Emerging Data Services.- Search on Encrypted Data.- Rights Assessment for Relational Data.