Get Free Shipping on orders over $79
Secure Data Management in Decentralized Systems - Ting Yu

Secure Data Management in Decentralized Systems

By: Ting Yu, ?Sushil Jajodia

eText | 11 May 2007 | Edition Number 1

At a Glance

eText


$169.00

or 4 interest-free payments of $42.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations. Instead, allowing selective access from different security domains has become a must for many business practices. Many of the assumptions and problems in traditional databases need to be revisited and readdressed in decentralized en- ronments. Further, the Internet and the Web offer means for collecting and sharing data with unprecedented flexibility and convenience. New data services are eme- ing every day, which also bring new challenges to protect of data security. We have witnessed many exciting research works toward identifying and addressing such new challenges. We feel it is necessary to summarize and systematically present works in these new areas to researchers. This book presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions.
on
Desktop
Tablet
Mobile

More in Databases

China's Megatrends : The 8 Pillars of a New Society - John Naisbitt

eBOOK

AI-Powered Search - Trey Grainger

eBOOK

Transformers in Action - Nicole Koenigstein

eBOOK

Investing for Programmers - Stefan Papp

eBOOK

Conquering the Decision Abyss - Keith Hartley

eBOOK

RRP $15.39

$14.99