Publication year: 2007
ISBN: 978-3-540-73538-0
Internet Resource: Please Login to download book
This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based security, temporal access control and usage control, as well as system security issues.
Subject: Computer Science, Information, Trusted Computing, auditing, configuration, cryptography, data security, database security, distributed systems, inference control, integrity maintenance, privacy, secu, security, security assessment, security protocol