000 | 03343nam a22003495i 4500 | ||
---|---|---|---|
001 | 323571 | ||
003 | MX-SnUAN | ||
005 | 20160429161642.0 | ||
007 | cr nn 008mamaa | ||
008 | 160111s2014 gw | s |||| 0|eng d | ||
020 |
_a9783662439364 _9978-3-662-43936-4 |
||
035 | _avtls000424019 | ||
039 | 9 |
_y201601111047 _zstaff |
|
050 | 4 | _aQA76.9.A25 | |
245 | 1 | 0 |
_aData and applications security and privacy xxviii : _b28th annual ifip wg 11.3 working conference, dbsec 2014, vienna, austria, july 14-16, 2014. Proceedings / _cedited by Vijay Atluri, Günther Pernul. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bSpringer, _c2014. |
|
300 |
_axviii, 391 páginas : _b97 ilustraciones |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8566 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aIntegrity Assurance for Outsourced Databases without DBMS Modification -- Specification and Deployment of Integrated Security Policies for Outsourced Data -- Optimizing Integrity Checks for Join Queries in the Cloud -- Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials -- Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds -- Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud -- Data Leakage Quantification -- Toward Software Diversity in Heterogeneous Networked Systems -- FSquaDRA: Fast Detection of Repackaged Applications -- ‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices -- Design Patterns for Multiple Stakeholders in Social Computing -- Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure -- ELITE: zEro Links Identity managemenT systEm -- Dynamic Workflow Adjustment with Security Constraints -- Consistent Query Plan Generation in Secure Cooperative Data Access -- Hunting the Unknown: White-Box Database Leakage Detection -- Incremental Analysis of Evolving Administrative Role Based Access Control Policies -- Mining Attribute-Based Access Control Policies from Logs -- Attribute-Aware Relationship-Based Access Control for Online Social Networks -- Randomly Partitioned Encryption for Cloud Databases -- Towards Secure Cloud Database with Fine-Grained Access Control -- Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database -- LPM: Layered Policy Management for Software-Defined Networks -- On Minimizing the Size of Encrypted Databases -- Efficient and Enhanced Solutions for Content Sharing in DRM Systems -- A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters. | |
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aAtluri, Vijay, _eeditor. _9342865 |
|
700 | 1 |
_aPernul, Günther, _eeditor. _9329320 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783662439357 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-662-43936-4 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c323571 _d323571 |