"As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's "i ..."
"15th Int. Con/, 1989, pp. 142-152. 19. K.C. Kim, "Parallelism in object-oriented
query processing," in Proc. 6th Int. Conf. Data Engineering, 1990, pp. 209-217.
20. W. Kim, et al., "Integrating an object-oriented programming system with a
database system," in Proc. Conf. Object-Oriented Programming Systems, ... M.
Kitsuregawa, H. Tanaka, and T. Moto-oka, "Architecture and performance of
relational algebra machine GRACE," in Proc. I ..."
"M. Kitsuregawa, H. Tanaka, and T. Moto-oka, “Architecture and performance of
relational algebra machine GRACE,” in Proc. Int. Conf Parallel Processing, IEEE,
Bellaire, MI., 1984, pp. 241–250. M. Kitsuregawa, H. ... Varker, W.W. Wilcke, D.J.
Zukowski, A.K. Thakore, and S.Y.W. Su, “Monitoring and simulation of processing
strategies for large knowledge bases on the IBM victor multiprocessor,” Proc.
Second Conf. North American Transput ..."
"Distributed and Parallel Database Object Management brings together in one place important contributions and state-of-the-art research results in this rapidly advancing area of computer science. Distributed and Parallel Database Object Management serves as an excellent reference, providing insights into some of the most important issues in the field. "
"The topics will broadly cover trust, privacy, and security models and mechanisms for AI ML Deep Learning, and emerging smart and intelligent systems applications."
"The chapter “Blockchain Application for IoT Cybersecurity Management” reviews
the IoT concept and definitions, generalized IoT ... The chapter “IoT Security
using Blockchain” introduces the security issues concerning the Internet of
Things (IoT) and in particular, ... trend of launching security token offerings (STOs
), by analyzing how regulators from different countries decided to handle the
phenomenon."
"[46] Yonatan Sompolinsky and Aviv Zohar. Secure high-rate transaction
processing in Bitcoin. In International Conference on Financial Cryptography and
Data Security, pp. 507-527, 2015. [47] Andrew Miller, Ahmed Kosba, Jonathan
Katz, and ..."
"As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during the past twelve years. Much of exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both physical level and network level. At physical level, RFID security means that RFID devic ..."
"... EuroCrypt and AsiaCrypt. In addition to the research topics typically covered in
such journals and conferences, the series also solicits lectures on legal, policy,
social, business, and economic issues addressed to a technical audience of
scientists and engineers. Lectures on significant industry developments by
leading practitioners are also solicited. RFID Security and Privacy Yingjiu Li,
Robert H. Deng, and Elisa Bertino 201 ..."
Private Information Retrieval(1st Edition) (Synthesis Lectures on Information Security, Privacy, and Tru) by Xun Yi, ElisaBertino, Russell Paulet Paperback, 114 Pages, Published 2013 by Morgan & Claypool Publishers ISBN-13: 978-1-62705-153-8, ISBN: 1-62705-153-8
"This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his ..."
"Private information retrieval (PIR) protocol allows a user to retrieve the i-th bit of
an n-bit database, without revealingto the databaseserver the value of i. A trivial
solution is for the user to retrieve the entire database, but this approach may incur
..."
"Samet, H. (1989). The design and analysis of spatial data structures.
AddisonWesley. Scheuermann, P. and Ouksel, M. (1982). Multidimensional B-
trees for associative searching in database systems. Information Systems, 7(2):
123–137. Seeger, B. and Kriegel, H. (1988). Techniques for design and
REFERENCES 241."
Synthesis Lectures on Data Management Synthesis Lectures on Data Management : Data Protection from Insider Threats by ElisaBertino 91 Pages, Published 2012 by Morgan & Claypool Publishers ISBN-13: 978-1-60845-769-4, ISBN: 1-60845-769-9
"Her research interests cover many areas in the fields ofin- formation security and
database systems. ... Current research includes: access control systems and
digital identity management; secure publishing techniques and secure broadcast
for XML data; advanced RBAC models and foundations of access control models;
trust negotiation languages and privacy; cloud se- curity; and geographical ..."
"Identity management is an endeavor to make identities available to humans,
services, and systems in a secure and privacy-protecting manner. As exemplified
in cloud computing, ICT-enabled infrastructures have a crucial role in global
collaboration for social and economic advancement. Such infrastructures must
incorporate identity management capabilities that allow individuals and
organizations to identify and trust each other over n ..."
Identity Management Concepts, Technologies, and Systems (Artech House Information Security and Privacy) by ElisaBertino, Kenji Takahashi Hardcover, 196 Pages, Published 2010 by Artech House ISBN-13: 978-1-60807-039-8, ISBN: 1-60807-039-5
"Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers an in-depth understanding of how ..."
"Sistemas de gestión de bases de datos «inteligentes» Estos sistemas extienden
la tecnología de las bases de datos incorporando paradigmas y técnicas
desarrolladas en el campo de la inteligencia artificial. ... aunque todavía carezca
de un modelo común de datos y de fundamentos formales similares a los del
modelo rela- cional, y aunque sus niveles de eficiencia operacional y
comportamiento (en áreas tales como las transacciones y la ..."
XML Security by ElisaBertino Paperback, Published 2003 ISBN-13: 978-0-201-78887-7, ISBN: 0-201-78887-X
"Many of the designations used by manufacturers and sellers to distinguish their
products are claimed as trademarks. Pearson Education Limited has made every
attempt to supply trademark information about manufacturers and their products
mentioned in this book. 10 987654321 Typeset by Pantek Arts Ltd, Kent Printed
and bound in Great Britain by Bidd1es Ltd. Guildford and King's Lynn The
Publishers' policy is to use paper manufactured ..."
"Recent years have seen an explosive growth in the use of new database applications such as CAD/CAM systems, spatial information systems, and multimedia information systems. The needs of these applications are far more complex than traditional business applications. They call for support of objects with complex data types, such as images and spatial objects, and for support of objects with wildly varying ..."