Handbook of Database Security: Applications and Trends
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today’s often missi- critical databases no longer contain only data used for day-to-day processing by organization; as new applications are being added, it is possible for organizations to collect and store vast amounts of data quickly and ef ciently and to make the data readily accessible to the public, typically through Web-based applications. Unfor- nately, if security threats related to the integrity, availability, and privacy of the data are not properly resolved, databases remain vulnerable to malicious attacks and - cidental misuse. Such incidents, in turn, may translate into nancial losses or losses whose values are obviously high but dif cult to quantify, e. g. , the loss of the public’s trust in the data management infrastructure and services offered by an organization. In assembling this handbook, we have had a twofold objective: rst, to provide a comprehensive summary of the results of research and development activities in various aspects of database security up to this point, and second, to point toward directions for future work in this important and fruitful eld of research.
1101681221
Handbook of Database Security: Applications and Trends
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today’s often missi- critical databases no longer contain only data used for day-to-day processing by organization; as new applications are being added, it is possible for organizations to collect and store vast amounts of data quickly and ef ciently and to make the data readily accessible to the public, typically through Web-based applications. Unfor- nately, if security threats related to the integrity, availability, and privacy of the data are not properly resolved, databases remain vulnerable to malicious attacks and - cidental misuse. Such incidents, in turn, may translate into nancial losses or losses whose values are obviously high but dif cult to quantify, e. g. , the loss of the public’s trust in the data management infrastructure and services offered by an organization. In assembling this handbook, we have had a twofold objective: rst, to provide a comprehensive summary of the results of research and development activities in various aspects of database security up to this point, and second, to point toward directions for future work in this important and fruitful eld of research.
169.99 In Stock
Handbook of Database Security: Applications and Trends

Handbook of Database Security: Applications and Trends

Handbook of Database Security: Applications and Trends

Handbook of Database Security: Applications and Trends

Hardcover(2008)

$169.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today’s often missi- critical databases no longer contain only data used for day-to-day processing by organization; as new applications are being added, it is possible for organizations to collect and store vast amounts of data quickly and ef ciently and to make the data readily accessible to the public, typically through Web-based applications. Unfor- nately, if security threats related to the integrity, availability, and privacy of the data are not properly resolved, databases remain vulnerable to malicious attacks and - cidental misuse. Such incidents, in turn, may translate into nancial losses or losses whose values are obviously high but dif cult to quantify, e. g. , the loss of the public’s trust in the data management infrastructure and services offered by an organization. In assembling this handbook, we have had a twofold objective: rst, to provide a comprehensive summary of the results of research and development activities in various aspects of database security up to this point, and second, to point toward directions for future work in this important and fruitful eld of research.

Product Details

ISBN-13: 9780387485324
Publisher: Springer US
Publication date: 11/30/2007
Edition description: 2008
Pages: 577
Product dimensions: 6.10(w) x 9.25(h) x 0.06(d)

Table of Contents

Recent Advances in Access Control.- Access Control Models for XML.- Access Control Policy Languages in XML.- Database Issues in Trust Management and Trust Negotiation.- Authenticated Index Structures for Outsourced Databases.- Towards Secure Data Outsourcing.- Managing and Querying Encrypted Data.- Security in Data Warehouses and OLAP Systems.- Security for Workflow Systems.- Secure Semantic Web Services.- Geospatial Database Security.- Security Re-engineering for Databases: Concepts and Techniques.- Database Watermarking for Copyright Protection.- Database Watermarking: A Systematic View.- Trustworthy Records Retention.- Damage Quarantine and Recovery in Data Processing Systems.- Hippocratic Databases: Current Capabilities and Future Trends.- Privacy-Preserving Data Mining: A Survey.- Privacy in Database Publishing: A Bayesian Perspective.- Privacy Preserving Publication: Anonymization Frameworks and Principles.- Privacy Protection through Anonymity in Location-based Services.- Privacy-enhanced Location-based Access Control.- Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment.
From the B&N Reads Blog

Customer Reviews