Fr. 69.00

Principles of Data Security

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

With the greatly increased use of electronic media for processing and storing data, data security became an important practical issue. This is especially true for the extensively shared and distributed systems which are more and more being accepted in commercial operations. Essen tially, the problem is that of protecting data, including all the impli cations which this has to the end user as well as the systems or database designer. However, usually the term data security refers to protection by technical, i.e., computer science specific, means; if one wants to in clude issues such as physical security, how to select the group of people who should have authority to perform certain operations, etc., the term computer security is more appropriate. The object of this book is to provide technical solutions to (facets of) the problem of achieving data security. The reader who hopes to find clever recipes which allow circumventing protection mechanisms will, however, be sadly disappointed. In fact, we deliberately kept the presentation of the material at a fairly general level. While the short term benefit of such an approach may be somewhat smaller, we feel that without a thorough understanding of the fundamental issues and problems in data security there will never be secure systems. True, peo ple probably always considered certain security aspects when designing a system. However, an integrated approach is absolutely imperative.

List of contents

1. Data Security: Introduction and Motivation.- 2. Statistical Database Security.- 2.1. Introduction.- 2.2. Security with Characteristic-Specified Queries.- 2.3. Security in the Key-Specified Model.- 2.4. Conclusion.- 3. Authorization Mechanisms.- 3.1. Introduction.- 3.2. The Undecidability of the Safety Problem for General Authorization Systems.- 3.3. Authorization Systems with Tractable Safety Problem.- 3.4. Overview of a Practical Implementation.- 4. Cryptosystems.- 4.1. Introduction and Motivation.- 4.2. Symmetric Cryptosystems.- 4.3. Public Key Cryptosystems.- 4.4. Authentication and Digital Signatures.- 4.5. Protecting Ownership of Proprietary Data and Software.- References.

Product details

Authors Ernst Leiss, Ernst L Leiss, Ernst L. Leiss
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 16.10.2013
 
EAN 9781468443189
ISBN 978-1-4684-4318-9
No. of pages 238
Illustrations 238 p.
Series Foundations of Computer Science
Foundations of Computer Science
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.