Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
|
Buy Now
Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008 ed.)
Loot Price: R1,469
Discovery Miles 14 690
|
|
Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008 ed.)
Series: Information Systems and Applications, incl. Internet/Web, and HCI, 5159
Expected to ship within 10 - 15 working days
|
Information and communication technologies are advancing fast.
Processing speed is still increasing at a high rate, followed by
advances in digital storage technology, which double storage
capacity every year. Furthermore, communication techno- gies do not
lag behind. The Internet has been widely used, as well as wireless
te- nologies. With a few mouse clicks, people can communicate with
each other around the world. All these advances have great
potential to change the way people live, introducing new concepts
like ubiquitous computing and ambient intelligence. Technology is
becoming present everywhere in the form of smart and sensitive c-
puting devices. They are nonintrusive, transparent and hidden in
the background, but they collect, process, and share all kinds of
information, including user beh- ior, in order to act in an
intelligent and adaptive way. These emerging technologies put new
requirements on security and data m- agement. As data are
accessible anytime anywhere, it becomes much easier to get
unauthorized data access. Furthermore, the use of new technologies
has brought about some privacy concerns. It becomes simpler to
collect, store, and search personal information, thereby
endangering people's privacy. Therefore, research in secure data
management is gaining importance, attracting the attention of both
the data management and the security research communities. The
intere- ing problems range from traditional topics, such as, access
control and general database security, via privacy protection to
new research directions, such as cryptographically enforced access
control.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|