Plus d’un million de livres à portée de main !
Bookbot

Sara Foresti

    Čarovné příběhy : pětiminutové příběhy
    Data and applications security and privacy XXIV
    Computer security
    Preserving Privacy in Data Outsourcing
    • Preserving Privacy in Data Outsourcing

      • 196pages
      • 7 heures de lecture

      Focusing on the protection of sensitive information stored externally, this book presents a comprehensive strategy that merges access control with encryption. It empowers data owners to outsource their security policy, ensuring their data remains secure even when managed by third parties. The innovative approach addresses the challenges of data security in an increasingly interconnected world.

      Preserving Privacy in Data Outsourcing
    • Computer security

      • 896pages
      • 32 heures de lecture

      This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

      Computer security
    • This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management.

      Data and applications security and privacy XXIV