• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • Handbook of Database Security: Applications and Trends

    Handbook of Database Security by Gertz, Michael; Jajodia, Sushil;

    Applications and Trends

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 160.49
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        68 079 Ft (64 837 Ft + 5% VAT)
      • Discount 20% (cc. 13 616 Ft off)
      • Discounted price 54 463 Ft (51 870 Ft + 5% VAT)

    68 079 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents the most comprehensive work on numerous data security aspects published in the last ten years.


    The Handbook of Database Security: Applications & Trends places a particular focus on data-centric security aspects that reach beyond traditional and well-studied data security aspects in databases. It also covers security in advanced database systems, data privacy and trust management, and data outsourcing, and outlines directions for future research in these fields.


    The Handbook of Database Security: Applications & Trends is designed for a professional audience composed of practitioners and researchers in industry and academia as a reference book. This volume is also suitable for advanced-level students in computer science interested in the state-of-the-art in data security.

    More

    Long description:

    Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today?s often missi- critical databases no longer contain only data used for day-to-day processing by organization; as new applications are being added, it is possible for organizations to collect and store vast amounts of data quickly and ef ciently and to make the data readily accessible to the public, typically through Web-based applications. Unfor- nately, if security threats related to the integrity, availability, and privacy of the data are not properly resolved, databases remain vulnerable to malicious attacks and - cidental misuse. Such incidents, in turn, may translate into nancial losses or losses whose values are obviously high but dif cult to quantify, e. g. , the loss of the public?s trust in the data management infrastructure and services offered by an organization. In assembling this handbook, we have had a twofold objective: rst, to provide a comprehensive summary of the results of research and development activities in various aspects of database security up to this point, and second, to point toward directions for future work in this important and fruitful eld of research.

    More

    Table of Contents:

    Recent Advances in Access Control.- Access Control Models for XML.- Access Control Policy Languages in XML.- Database Issues in Trust Management and Trust Negotiation.- Authenticated Index Structures for Outsourced Databases.- Towards Secure Data Outsourcing.- Managing and Querying Encrypted Data.- Security in Data Warehouses and OLAP Systems.- Security for Workflow Systems.- Secure Semantic Web Services.- Geospatial Database Security.- Security Re-engineering for Databases: Concepts and Techniques.- Database Watermarking for Copyright Protection.- Database Watermarking: A Systematic View.- Trustworthy Records Retention.- Damage Quarantine and Recovery in Data Processing Systems.- Hippocratic Databases: Current Capabilities and Future Trends.- Privacy-Preserving Data Mining: A Survey.- Privacy in Database Publishing: A Bayesian Perspective.- Privacy Preserving Publication: Anonymization Frameworks and Principles.- Privacy Protection through Anonymity in Location-based Services.- Privacy-enhanced Location-based Access Control.- Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment.

    More