0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Secure Data Management - Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings (Paperback, 2005 ed.) Loot Price: R1,634
Discovery Miles 16 340
Secure Data Management - Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings...

Secure Data Management - Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings (Paperback, 2005 ed.)

Willem Jonker, Milan Petkovic

Series: Information Systems and Applications, incl. Internet/Web, and HCI, 3674

 (sign in to rate)
Loot Price R1,634 Discovery Miles 16 340 | Repayment Terms: R153 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Althoughcryptographyandsecuritytechniqueshavebeenaroundfor quitesome time, emerging technologies such as ubiquitous computing and ambient intel- gence that exploit increasingly interconnected networks, mobility and pers- alization put new requirements on security with respect to data management. As data is accessible anytime anywhere, according to these new concepts, it - comes much easier to get unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy. Therefore, researchin the area of secure data management is of growing importance, attracting the attention of both the data management and security researchcommunities.Theinterestingproblemsrangefromtraditionalones, such as access control (with all variations, like dynamic, context-aware, role-based), database security (e.g., e?cient database encryption schemes, search over - crypted data, etc.), and privacy-preserving data mining to controlled sharing of data. In addition to the aforementioned subject, this year we also called for - pers devoted to secure data management in healthcare as a domain where data security and privacy issues are traditionally important. The call for papers - tracted 38 papers both from universities and industry. The ProgramCommittee selected 16 research papers for presentation at the workshop. These papers are also collected in this volume which we hope will serve you as a useful research and reference material.

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Information Systems and Applications, incl. Internet/Web, and HCI, 3674
Release date: August 2005
First published: 2005
Editors: Willem Jonker • Milan Petkovic
Dimensions: 235 x 155 x 13mm (L x W x T)
Format: Paperback
Pages: 246
Edition: 2005 ed.
ISBN-13: 978-3-540-28798-8
Categories: Books > Computing & IT > Computer communications & networking > Network security
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
LSN: 3-540-28798-1
Barcode: 9783540287988

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners