请选择 进入手机版 | 继续访问电脑版

科研迷论坛

 找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
查看: 177|回复: 0

Preserving Privacy in Data Outsourcing-[1]-[2011]-[pdf]-[Sara Foresti (auth.)]

[复制链接]

该用户从未签到

0

主题

0

小红花

125

学币

管理员

Rank: 9

积分
0
发表于 2020-2-10 21:58:42 | 显示全部楼层 |阅读模式
★★★闹不够看这里★★★1、每个同学都有一个独一无二的推广链接,请点击这里来获取
2、把你的推广链接告诉你的同学、同事、朋友,让他们注册,或者分享到你的微博,微信朋友圈、博客或者其他的论坛,让更多人的通过你的链接进来注册,那么你会获得非常可观的学币
3、每一个用户,通过你的链接来到论坛进行注册后,你都会获得10个学币!即便用户没有注册,他只要点击了你给的链接,浏览了科研迷论坛,你也能获得1个学币
4、通过分享资料,资料上传分享成功会获得5~10个学币!其他用户下载还会获得额外的学币哦!


免费下载30页预览文件

书籍信息:
书名: Preserving Privacy in Data Outsourcing
语言: English
格式: pdf
大小: 3.4M
页数: 180
年份: 2011
作者: Sara Foresti (auth.)
版次: 1
系列: Advances in Information Security 51
出版社: Springer US

简介

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.
Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.
Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.




目录
Front Matter....Pages i-xv
Introduction....Pages 1-7
Overview of the State of the Art....Pages 9-30
Selective Encryption to Enforce Access Control....Pages 31-84
Combining Fragmentation and Encryption to Protect Data Privacy....Pages 85-134
Distributed Query Processing under Safely Composed Permissions....Pages 135-169
Conclusions....Pages 171-174
Back Matter....Pages 175-180

电子书下载地址(Ebook download address)回复可见:
游客,如果您要查看本帖隐藏内容请回复

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

Archiver|手机版|小黑屋|科研迷论坛 ( 闽ICP备17033831号-3 ) hello xym!!

GMT+8, 2020-7-5 23:47 , Processed in 0.025994 second(s), 10 queries , Redis On.

Powered by Discuz! X3.4

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表