Introduction.- Distributed Access Control.- Terminology.- General Access Control Models.- Discretionary Access Control.- Other Access Control Paradigms.- Adaptive Access Control.- Efficient Key Management Heuristics.- The Akl and Taylor Key Management Scheme.- A Key Assignment Algorithm.- Enforcing Key Updates Effectively.- Complexity and Security Analysis.- Experimental Result.- Timestamped Key Management.- Timestamped Key Assignment.- Timestamped Key Updates.- Complexity and Security Analysis.- Experimental Results.- Key Management in Outsourced Data Scenarios.- Why Key Management for Outsourced Data is different.- Background on protecting outsourced data.- An Efficient Key Management Technique.- Security Analysis.- Experimental Results and Discussions.- Challenges of Securing Outsourced Data.- Adaptive Key Management.- A Framework for Adaptive Key Updates: Model and Example.- Implementation and Experimental Setup.- Discussions.- Collusion Detection and Resolution.- Detecting Collusion Possibilities.- Adaptive Collusion Detection and Resolution Framework.- Experimental Setup and Results.- Discussions.- Summary and Conclusions.- Summary and Critique.- Areas for Future Work
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want