Apress

Secure Data Management in Decentralized Systems

By Ting Yu , Sushil Jajodia

Secure Data Management in Decentralized Systems Cover Image

The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. This book identifies and addresses these new challenges and more, offering solid advice for practitioners and researchers in industry.

Full Description

  • ISBN13: 978-0-3872-7694-6
  • 472 Pages
  • User Level: Professionals
  • Publication Date: May 11, 2007
  • Available eBook Formats: PDF
  • eBook Price: $149.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business practices. New data services are emerging everyday, which also brings new challenges to protect data security. The internet and the web offer means to collecting and sharing data with unprecedented flexibility and convenience. Secure Data Management in Decentralized Systems identifies and addresses these new challenges. This volume presents a wide range of active areas, closely related to database security by distinguished leaders within this field. Solutions are included. Secure Data Management in Decentralized Systems is designed for a professional audience composed of practitioners and researchers in industry. This book is suitable for graduate-level students in computer science as well.
Table of Contents

Table of Contents

  1. Preface.
  2. Foundation.
  3. Basic Security Concepts.
  4. Access Control Policies and Languages in Open Environments.
  5. Trusted Recovery.
  6. Access Control for Semi
  7. Structured Data.
  8. Access Control Policy Models for XML.
  9. Optimizing Tree Pattern Queries over Secure XML Databases.
  10. Distributed Trust Management.
  11. Rule
  12. Based Policy Specification.
  13. Automated Trust Negotiation in Open Systems.
  14. Building Trust and Security in Peer
  15. to
  16. Peer Systems.
  17. Privacy in Cross
  18. Domain Information Sharing.
  19. Microdata Protection.
  20. k
  21. Anonymity.
  22. Preserving Privacy in On
  23. Line Analytical Processing Data Cubes.
  24. Security in Emerging Data Services.
  25. Search on Encrypted Data.
  26. Rights Assessment for Relational Data.
Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published