Principles of Data Security

With the greatly increased use of electronic media for processing and storing data, data security became an important practical issue. This is especially true for the extensively shared and distributed systems which are more and more being accepted in commercial operations. Essen­ tially, the proble...

Full description

Bibliographic Details
Main Author: Leiss, Ernst L.
Format: eBook
Language:English
Published: New York, NY Springer US 1982, 1982
Edition:1st ed. 1982
Series:Foundations of Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 03124nmm a2200301 u 4500
001 EB000628880
003 EBX01000000000000000481962
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9781468443165 
100 1 |a Leiss, Ernst L. 
245 0 0 |a Principles of Data Security  |h Elektronische Ressource  |c by Ernst L. Leiss 
250 |a 1st ed. 1982 
260 |a New York, NY  |b Springer US  |c 1982, 1982 
300 |a 238 p  |b online resource 
505 0 |a 1. Data Security: Introduction and Motivation -- 2. Statistical Database Security -- 2.1. Introduction -- 2.2. Security with Characteristic-Specified Queries -- 2.3. Security in the Key-Specified Model -- 2.4. Conclusion -- 3. Authorization Mechanisms -- 3.1. Introduction -- 3.2. The Undecidability of the Safety Problem for General Authorization Systems -- 3.3. Authorization Systems with Tractable Safety Problem -- 3.4. Overview of a Practical Implementation -- 4. Cryptosystems -- 4.1. Introduction and Motivation -- 4.2. Symmetric Cryptosystems -- 4.3. Public Key Cryptosystems -- 4.4. Authentication and Digital Signatures -- 4.5. Protecting Ownership of Proprietary Data and Software -- References 
653 |a Electrical and Electronic Engineering 
653 |a Electrical engineering 
653 |a Data protection 
653 |a Data and Information Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Foundations of Computer Science 
028 5 0 |a 10.1007/978-1-4684-4316-5 
856 4 0 |u https://doi.org/10.1007/978-1-4684-4316-5?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a With the greatly increased use of electronic media for processing and storing data, data security became an important practical issue. This is especially true for the extensively shared and distributed systems which are more and more being accepted in commercial operations. Essen­ tially, the problem is that of protecting data, including all the impli­ cations which this has to the end user as well as the systems or database designer. However, usually the term data security refers to protection by technical, i.e., computer science specific, means; if one wants to in­ clude issues such as physical security, how to select the group of people who should have authority to perform certain operations, etc., the term computer security is more appropriate. The object of this book is to provide technical solutions to (facets of) the problem of achieving data security. The reader who hopes to find clever recipes which allow circumventing protection mechanisms will, however, be sadly disappointed. In fact, we deliberately kept the presentation of the material at a fairly general level. While the short­ term benefit of such an approach may be somewhat smaller, we feel that without a thorough understanding of the fundamental issues and problems in data security there will never be secure systems. True, peo­ ple probably always considered certain security aspects when designing a system. However, an integrated approach is absolutely imperative