Читать книгу Database Anonymization - David Sánchez - Страница 3

Оглавление

Synthesis Lectures on Information Security, Privacy, & Trust

Editor

Elisa Bertino, Purdue University

Ravi Sandhu, University of Texas at San Antonio

The Synthesis Lectures Series on Information Security, Privacy, and Trust publishes 50- to 100-page publications on topics pertaining to all aspects of the theory and practice of Information Security, Privacy, and Trust. The scope largely follows the purview of premier computer security research journals such as ACM Transactions on Information and System Security, IEEE Transactions on Dependable and Secure Computing and Journal of Cryptology, and premier research conferences, such as ACM CCS, ACM SACMAT, ACM AsiaCCS, ACM CODASPY, IEEE Security and Privacy, IEEE Computer Security Foundations, ACSAC, ESORICS, Crypto, EuroCrypt and AsiaCrypt. In addition to the research topics typically covered in such journals and conferences, the series also solicits lectures on legal, policy, social, business, and economic issues addressed to a technical audience of scientists and engineers. Lectures on significant industry developments by leading practitioners are also solicited.

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

Josep Domingo-Ferrer, David Sánchez, and Jordi Soria-Comas

2016

Automated Software Diversity

Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, and Michael Franz

2015

Trust in Social Media No Access

Jiliang Tang and Huan Liu

2015

Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions No Access

Christian Wachsmann and Ahmad-Reza Sadeghi

2014

Usable Security: History, Themes, and Challenges No Access

Simson Garfinkel and Heather Richter Lipford

2014

Reversible Digital Watermarking: Theory and Practices No Access

Ruchira Naskar and Rajat Subhra Chakraborty

2014

Mobile Platform Security No Access

N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, and Ahmad-Reza Sadeghi

2013

Security and Trust in Online Social Networks No Access

Barbara Carminati, Elena Ferrari, and Marco Viviani

2013

RFID Security and Privacy No Access

Yingjiu Li, Robert H. Deng, and Elisa Bertino

2013

Hardware Malware No Access

Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl

2013

Private Information Retrieval No Access

Xun Yi, Russell Paulet, and Elisa Bertino

2013

Privacy for Location-based Services No Access

Gabriel Ghinita

2013

Enhancing Information Security and Privacy by Combining Biometrics with Cryptography No Access

Sanjay G. Kanade, Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi

2012

Analysis Techniques for Information Security No Access

Anupam Datta, Somesh Jha, Ninghui Li, David Melski, and Thomas Reps

2010

Operating System Security No Access

Trent Jaeger

2008

Database Anonymization

Подняться наверх