Security, Privacy, and Trust in Modern Data Management

By Milan Petkovic , Willem Jonker

Security, Privacy, and Trust in Modern Data Management Cover Image

  • ISBN13: 978-3-5406-9860-9
  • 490 Pages
  • User Level: Science
  • Publication Date: June 12, 2007
  • Available eBook Formats: PDF
  • eBook Price: $129.00
Buy eBook Buy Print Book Add to Wishlist

Related Titles

Full Description
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems are much more vulnerable to attacks and unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy. In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect to security, privacy and trust. After the introductory part that offers a perspective on privacy and security issues in the modern digital world, the contributions from leading researchers are grouped into sections on data and system security, privacy-enhancing techniques, digital asset protection, and selected topics on privacy and security in ambient intelligence. Overall, the book delivers, from information on the ethical and legislative background, to chapters on the state-of-the-art technologies such as access control, identity management and digital rights management to advice on implementing fair information practices and preventing security and privacy violations. With this broad approach, this book appeals equally to researchers and graduate students looking for an overview of this area of ever-growing importance and to professional developers who require sound theoretical grounds for the design and implementation of secure privacy-preserving ubiquitous applications.
Table of Contents

Table of Contents

  1. Part I: Introduction.
  2. Ambient Intelligence
  3. Privacy and Security Issues in an Ambient World
  4. Legislation background for the Security and Privacy in the AmI Context.
  5. Part II: Digital Asset Protection: Introduction to DRM
  6. OMA Standardization
  7. Person
  8. based DRM
  9. CE Standardizations:Coral and Marlin
  10. DRM for Protecting Personal Content
  11. Protecting Electronic Health Records
  12. Template Protection
  13. Watermarking
  14. Copy Protection.
  15. Part III: Privacy in Ambient World:Privacy in Ambient World
  16. Private Profile Matching
  17. Search on Encrypted Data
  18. Privacy
  19. preserving Data Mining
  20. Semantic Web and Privacy
  21. RFID and Privacy
  22. Identity Management
  23. Private Information Retrieval.
  24. Part IV: Security in Ambient World:Database Security
  25. Authorization and Access Control
  26. Role
  27. based Access Control
  28. Statistical Database Security
  29. XML Security
  30. Software Tamper Resistance
  31. Mobile Code Security
  32. Malware
  33. Trust Management.
Errata

Please Login to submit errata.

No errata are currently published