Adaptive cryptographic access control
IntroductionA presentation of access control methods -- Efficient key management : heuristics -- Timestamped key management -- Controlling access to outsourced data -- Self-protecting key management -- Collusion detection and resolution -- Conclusions.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , , |
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
New York, Heidelberg u.a.
Springer Science+Business Media, LLC
2010
|
Schriftenreihe: | Advances in information security
48 |
Schlagworte: |
Data encryption (Computer science)
> Computers
> Access control
> Database security
> Computer science
> Operating systems (Computers)
> Data structures (Computer science)
> Database management
> Information storage and retrieval systems
> Information systems
> Computer Science
> Informationssystem
> Zugriffskontrolle
> Kryptosystem
|
Online Zugang: | Inhaltstext Inhaltsverzeichnis Einführung/Vorwort Inhaltstext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | IntroductionA presentation of access control methods -- Efficient key management : heuristics -- Timestamped key management -- Controlling access to outsourced data -- Self-protecting key management -- Collusion detection and resolution -- Conclusions. |
---|---|
Beschreibung: | XIII, 138 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 9781441966544 978-1-4419-6654-4 |