Description |
xv, 180 pages : illustrations ; 25 cm |
Series |
Advances in information security, 1568-2633 ; 51 |
|
Advances in information security. 1568-2633 ; 51
|
Contents |
Introduction -- Overview of the state of the art -- Selective encryption to enforce access control -- Combining fragmentation and encryption to protect data privacy -- Distributed query processing under safely composed permissions -- Conclusions |
Summary |
Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrate |
Notes |
Originally presented as author's thesis (Ph.D.) |
Bibliography |
Includes bibliographical references |
Notes |
Print version record |
Subject |
Computer networks -- Security measures.
|
|
Computers -- Access control.
|
|
Contracting out.
|
|
Data protection.
|
|
Data encryption (Computer science)
|
|
Database security.
|
|
Electronic data processing departments -- Contracting out.
|
LC no. |
2010938037 |
ISBN |
9781441976581 |
|
9781441976598 (eISBN) |
|