0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.) Loot Price: R3,075
Discovery Miles 30 750
Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti

Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)

Sara Foresti

Series: Advances in Information Security, 51

 (sign in to rate)
Loot Price R3,075 Discovery Miles 30 750 | Repayment Terms: R288 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

General

Imprint: Springer-Verlag New York
Country of origin: United States
Series: Advances in Information Security, 51
Release date: October 2010
First published: 2011
Authors: Sara Foresti
Dimensions: 235 x 155 x 12mm (L x W x T)
Format: Hardcover
Pages: 180
Edition: 2011 Ed.
ISBN-13: 978-1-4419-7658-1
Categories: Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
Books > Computing & IT > General theory of computing > Data structures
Books > Computing & IT > Computer programming > Algorithms & procedures
Books > Computing & IT > Computer communications & networking > Network security
Books > Computing & IT > Applications of computing > Databases > General
LSN: 1-4419-7658-2
Barcode: 9781441976581

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners