Adaptive cryptographic access control
Gespeichert in:
Verfasser / Beitragende:
Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin ; foreword by Sylvia L. Osborn
Ort, Verlag, Jahr:
New York :
Springer,
2010
Beschreibung:
1 online resource (xiii, 138 pages) : illustrations
Format:
Buch (online)
Online Zugang:
| LEADER | cam a22 7 4500 | ||
|---|---|---|---|
| 001 | 277851017 | ||
| 003 | CHVBK | ||
| 005 | 20201009185914.0 | ||
| 006 | m d | ||
| 007 | cr |n |||||||| | ||
| 008 | 130818s2010 nyua sb 001 0 eng d | ||
| 010 | |a 2010932005 | ||
| 015 | |a GBB0-90783 |2 bnb | ||
| 016 | 7 | |a 015612520 |2 Uk | |
| 020 | |a 978-1-4419-6654-4 (hbk.) | ||
| 020 | |a 1-4419-6654-4 (hbk.) | ||
| 020 | |a 978-1-4419-6655-1 (eISBN) | ||
| 020 | |a 1-4419-6655-2 (eISBN) | ||
| 035 | |a (SERSOL)ssj0000410957 | ||
| 035 | |a (IDSSG)000525036 | ||
| 035 | |a (WaSeSS)ssj0000410957 | ||
| 040 | |a UKM |b eng |c UKM |d BTCTA |d YDXCP |d C#P |d CDX |d BWX |d TTS |d VRC |d UKMGB |d OCLCF |d OCLCO |d OCLCQ |d DLC |d WaSeSS | ||
| 050 | 0 | 0 | |a QA76.9.A25 |b K3963 2010 |
| 082 | 0 | 4 | |a 005.82 |2 22 |
| 091 | |a DEAGI73E054D31676FBC0C1257FCD004FB1F7 |b iCapture | ||
| 100 | 1 | |a Kayem |D Anne V. D. M. |q Anne Voluntas dei Massah | |
| 245 | 1 | 0 | |a Adaptive cryptographic access control |h [Elektronische Daten] |c Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin ; foreword by Sylvia L. Osborn |
| 260 | |a New York |b Springer |c ©2010 | ||
| 300 | |a 1 online resource (xiii, 138 pages) |b illustrations | ||
| 490 | 0 | |a Advances in information security |x 1568-2633 |v 48 | |
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Introduction -- A presentation of access control methods -- Efficient key management : heuristics -- Timestamped key management -- Controlling access to outsourced data -- Self-protecting key management -- Collusion detection and resolution -- Conclusions. | |
| 506 | |a Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access. | ||
| 650 | 0 | |a Data encryption (Computer science) | |
| 650 | 0 | |a Computers |x Access control | |
| 650 | 0 | |a Database security | |
| 653 | |a Information Systems Applications (incl.Internet) | ||
| 700 | 1 | |a Akl |D Selim G. | |
| 700 | 1 | |a Martin |D Patrick | |
| 856 | 4 | 0 | |u https://link.springer.com/10.1007/978-1-4419-6655-1 |z Uni Basel: Volltext |
| 898 | |a BK020053 |b XK020053 |c XK020000 | ||
| 909 | 4 | |f Springer Computer Science eBooks 2010 English/International | |
| 909 | 4 | |a E-Books von 360MarcUpdates | |
| 909 | 7 | |a noalma |2 ids I | |
| 949 | |B IDSSG |F HSG |b HSG |c ONL |j HONL000525036 | ||
| 949 | |B IDSBB |F A145 |b A145 |c 145VT | ||
| 950 | |B IDSBB |P 100 |E 1- |a Kayem |D Anne V. D. M. |q Anne Voluntas dei Massah | ||
| 950 | |B IDSBB |P 490 |E 1- |a Advances in information security |x 1568-2633 |v 48 | ||
| 950 | |B IDSBB |P 700 |E 1- |a Akl |D Selim G. | ||
| 950 | |B IDSBB |P 700 |E 1- |a Martin |D Patrick | ||
| 950 | |B IDSBB |P 856 |E 40 |u https://link.springer.com/10.1007/978-1-4419-6655-1 |z Uni Basel: Volltext | ||
| 950 | |B IDSSG |P 100 |E 1- |a Kayem |D Anne V. D. M. | ||
| 950 | |B IDSSG |P 490 |E 0- |a Advances in Information Security |v 48 | ||
| 950 | |B IDSSG |P 700 |E 1- |a Akl |D Selim G. | ||
| 950 | |B IDSSG |P 700 |E 1- |a Martin |D Patrick | ||
| 950 | |B IDSSG |P 856 |E 4- |u https://doi.org/10.1007/978-1-4419-6655-1 |z Full text for the University of St. Gallen | ||
| 986 | |a SWISSBIB |b 171749952 | ||