Preserving Privacy in Data Outsourcing Preserving Privacy in Data Outsourcing
Advances in Information Security

Preserving Privacy in Data Outsourcing

    • 97,99 €
    • 97,99 €

Beschreibung des Verlags

Here is a comprehensive approach to protecting highly sensitive information stored on systems outside the data owner’s control. The approach illustrated combines access control and encryption, allowing the data owner to outsource the security policy itself.

GENRE
Computer und Internet
ERSCHIENEN
2010
5. Oktober
SPRACHE
EN
Englisch
UMFANG
195
Seiten
VERLAG
Springer US
ANBIETERINFO
Springer Science & Business Media LLC
GRÖSSE
8,4
 MB
Security Infrastructure Technology for Integrated Utilization of Big Data Security Infrastructure Technology for Integrated Utilization of Big Data
2020
Algorithms for Data and Computation Privacy Algorithms for Data and Computation Privacy
2020
Association Rule Hiding for Data Mining Association Rule Hiding for Data Mining
2010
Secure Searchable Encryption and Data Management Secure Searchable Encryption and Data Management
2021
Fundamental Problems in Computing Fundamental Problems in Computing
2009
Secure Systems Development with UML Secure Systems Development with UML
2005
Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12)
2018
Maîtres des dragons, Tome 12 Maîtres des dragons, Tome 12
2021
Diario delle storie d'amore sbagliate Diario delle storie d'amore sbagliate
2021
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2020
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2020
Cryptology and Network Security Cryptology and Network Security
2016
Cybersecurity for Network and Information Security Cybersecurity for Network and Information Security
2026
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024