Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI: Special Issue on Data and Security Engineering

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI: Special Issue on Data and Security Engineering

ISBN-10:
3662562650
ISBN-13:
9783662562659
Pub. Date:
11/28/2017
Publisher:
Springer Berlin Heidelberg
ISBN-10:
3662562650
ISBN-13:
9783662562659
Pub. Date:
11/28/2017
Publisher:
Springer Berlin Heidelberg
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI: Special Issue on Data and Security Engineering

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI: Special Issue on Data and Security Engineering

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days. Not Eligible for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

This volume, the 36th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains eight revised, extended papers selected from the 3rd International Conference on Future Data and Security Engineering, FDSE 2016, and the 10th International Conference on Advanced Computing and Applications, ACOMP 2016, which were held in Can Tho City, Vietnam, in November 2016. Topics covered include big data analytics, massive dataset mining, security and privacy, cryptography, access control, deep learning, crowd sourcing, database watermarking, and query processing and optimization.

Product Details

ISBN-13: 9783662562659
Publisher: Springer Berlin Heidelberg
Publication date: 11/28/2017
Series: Lecture Notes in Computer Science , #10720
Edition description: 1st ed. 2017
Pages: 193
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

Risk-Based Privacy-Aware Access Control for Threat Detection Systems.- Systematic Digital Signing in Estonian e-Government Processes: Influencing Factors, Technologies, Change Management.- Towards a Fine-Grained Privacy-Enabled Attribute-Based Access Control Mechanism.- One-Class Collective Anomaly Detection Based on LSTM-RNNs.- Multihop Wireless Access Networks for Flood Mitigation Crowd-Sourcing Systems.- Assessment of Aviation Security Risk Management for Airline Turnaround Processes.- Scalable Automated Analysis of Access Control and Privacy Policies.- Partitioning-Insensitive Watermarking Approach for Distributed Relational Databases.

From the B&N Reads Blog

Customer Reviews