Preserving Privacy in Data Outsourcing Preserving Privacy in Data Outsourcing
Advances in Information Security

Preserving Privacy in Data Outsourcing

    • $109.99
    • $109.99

Publisher Description

Here is a comprehensive approach to protecting highly sensitive information stored on systems outside the data owner’s control. The approach illustrated combines access control and encryption, allowing the data owner to outsource the security policy itself.

GENRE
Computers & Internet
RELEASED
2010
October 5
LANGUAGE
EN
English
LENGTH
195
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
8.4
MB
Data and Applications Security and Privacy XXV Data and Applications Security and Privacy XXV
2011
Information and Communications Security Information and Communications Security
2008
Computer Security – ESORICS 2007 Computer Security – ESORICS 2007
2007
Computer Security - ESORICS 2008 Computer Security - ESORICS 2008
2008
Trusted Systems Trusted Systems
2016
Information Security and Cryptology Information Security and Cryptology
2016
Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12)
2018
Diario delle storie d'amore sbagliate Diario delle storie d'amore sbagliate
2021
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2020
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2020
Cryptology and Network Security Cryptology and Network Security
2016
Information Security Theory and Practice Information Security Theory and Practice
2016
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007