000 03343nam a22003495i 4500
001 323571
003 MX-SnUAN
005 20160429161642.0
007 cr nn 008mamaa
008 160111s2014 gw | s |||| 0|eng d
020 _a9783662439364
_9978-3-662-43936-4
035 _avtls000424019
039 9 _y201601111047
_zstaff
050 4 _aQA76.9.A25
245 1 0 _aData and applications security and privacy xxviii :
_b28th annual ifip wg 11.3 working conference, dbsec 2014, vienna, austria, july 14-16, 2014. Proceedings /
_cedited by Vijay Atluri, Günther Pernul.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bSpringer,
_c2014.
300 _axviii, 391 páginas :
_b97 ilustraciones
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8566
500 _aSpringer eBooks
505 0 _aIntegrity Assurance for Outsourced Databases without DBMS Modification -- Specification and Deployment of Integrated Security Policies for Outsourced Data -- Optimizing Integrity Checks for Join Queries in the Cloud -- Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials -- Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds -- Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud -- Data Leakage Quantification -- Toward Software Diversity in Heterogeneous Networked Systems -- FSquaDRA: Fast Detection of Repackaged Applications -- ‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices -- Design Patterns for Multiple Stakeholders in Social Computing -- Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure -- ELITE: zEro Links Identity managemenT systEm -- Dynamic Workflow Adjustment with Security Constraints -- Consistent Query Plan Generation in Secure Cooperative Data Access -- Hunting the Unknown: White-Box Database Leakage Detection -- Incremental Analysis of Evolving Administrative Role Based Access Control Policies -- Mining Attribute-Based Access Control Policies from Logs -- Attribute-Aware Relationship-Based Access Control for Online Social Networks -- Randomly Partitioned Encryption for Cloud Databases -- Towards Secure Cloud Database with Fine-Grained Access Control -- Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database -- LPM: Layered Policy Management for Software-Defined Networks -- On Minimizing the Size of Encrypted Databases -- Efficient and Enhanced Solutions for Content Sharing in DRM Systems -- A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aAtluri, Vijay,
_eeditor.
_9342865
700 1 _aPernul, Günther,
_eeditor.
_9329320
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783662439357
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-662-43936-4
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c323571
_d323571