Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: (("secularity" OR "peculiarity") OR "security")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
author_facet:"Jajodia, Sushil"
Search alternatives
:
"secularity" »
"regularity"
,
"secularism"
"peculiarity" »
"peculiarly"
,
"peculiarities"
Showing
1
-
20
of
41
Search:
'(("secularity" OR "peculiarity") OR "security")'
,
query time: 0.22s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Database
Security
XII : Status and Prospects
Published 1999
Springer US
Table of Contents:
“
...I Invited Talks -- 1 E-Commerce
Security
: No Silver Bullet -- 2 Technical Enforcement...
”
Read Now
2
Secure
Cloud Computing
Published 2014
Springer New York
Table of Contents:
“
...Cryptographic Key Management Issues and Challenges in Cloud Services -- Costs and
Security
...
”
Read Now
3
Information Systems
Security
: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings
Published 2011
Springer Berlin Heidelberg
Subjects:
“
...Data and Information
Security
...
”
Read Now
4
Graphical Models for
Security
: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
Published 2016
Springer International Publishing
Table of Contents:
“
...Integrated Visualization of Network
Security
Metadata from Heterogeneous Data Sources -- SysML-Sec...
”
Read Now
5
Encyclopedia of Cryptography and
Security
Published 2011
Springer US
“
... and
Security
brings the latest and most comprehensive coverage of the topic: Definitive information...
”
Read Now
6
Handbook of Database
Security
: Applications and Trends
Published 2008
Springer US
Table of Contents:
“
... Structures for Outsourced Databases -- Towards
Secure
Data Outsourcing -- Managing and Querying Encrypted...
”
Read Now
7
Information Systems
Security
: First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
...Event Detection in Multilevel
Secure
Active Databases -- Key Management for Multicast...
”
Read Now
8
Network
Security
Metrics
by
Wang, Lingyu
,
Jajodia, Sushil
,
Singhal, Anoop
Published 2017
Springer International Publishing
Table of Contents:
“
...1 Measuring the Overall Network
Security
by Combining CVSS Scores Based on Attack Graphs...
”
Read Now
9
Multilevel
Secure
Transaction Processing
by
Atluri, Vijay
,
Jajodia, Sushil
,
George, Binto
Published 2000
Springer US
Table of Contents:
“
...1. Introduction -- 1 Multilevel
Secure
Databases -- 2 Advanced Database Application Domains -- 3...
”
Read Now
10
Information
Security
Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings
Published 2015
Springer International Publishing
Table of Contents:
“
...
Security
and Privacy Services -- On Secrecy Amplification Protocols -- Privacy-respecting Auctions...
”
Read Now
11
Security
and Privacy in Communication Networks : 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
...DeCore: Detecting Content Repurposing Attacks on Clients’ Systems -- Network
Security
– I...
”
Read Now
12
Computer
Security
- ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings
Published 2008
Springer Berlin Heidelberg
Table of Contents:
“
...-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware
Security
-- Code-Carrying...
”
Read Now
13
Data and Applications
Security
XIX...
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
...Streams,
Security
and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages...
”
Read Now
14
Computer
Security
-- ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings
Published 2013
Springer Berlin Heidelberg
Table of Contents:
“
... Analysis -- Network
Security
-- Formal Models and Methods -- Protocol Analysis.- Privacy Enhancing Models...
”
Read Now
15
Security
and Protection in Information Processing Systems...
Published 2004
Springer US
Table of Contents:
“
... --
Security
and Differentiated Hotspot Services Through Policy-based Management Architecture -- Key Management...
”
Read Now
16
Information
Security
Management, Education and Privacy...
Published 2004
Springer US
Table of Contents:
“
...Corporate Information
Security
Education -- Towards Corporate Information
Security
Obedience...
”
Read Now
17
ICT Systems
Security
and Privacy Protection : 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings
Published 2014
Springer Berlin Heidelberg
Table of Contents:
“
...Intrusion detection -- Data
security
-- Mobile
security
-- Privacy -- Metrics and risk assessment...
”
Read Now
18
Data and Applications
Security
and Privacy XXIV : 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... in Authentication Protocols --
Secure
Location Verification...
”
Read Now
19
Secure
Data Management in Decentralized Systems
Published 2007
Springer US
Table of Contents:
“
...Foundation -- Basic
Security
Concepts -- Access Control Policies and Languages in Open Environments...
”
Read Now
20
Adaptive Autonomous
Secure
Cyber Systems
Published 2020
Springer International Publishing
Table of Contents:
“
... framework for studying autonomic computing models in cyber deception -- 6. Autonomous
Security
Mechanisms...
”
1
2
3
Back
Narrow Search
Remove Filters
Clear Filter
Author: Jajodia, Sushil
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
29
004 - Data processing & computer science
8
003 - Systems
6
040 - [Unassigned]
2
364 - Criminology
1
616 - Diseases
1
more ...
658 - General management
1
see all ...
less ...
Language
English
41
Collection
Springer eBooks 2005-
28
Springer Book Archives -2004
13
Author
Jajodia, Sushil
Swarup, Vipin
6
Wang, Cliff
5
Wang, Lingyu
5
Subrahmanian, V.S.
4
Cuppens, Frederic
3
more ...
Liu, Peng
3
Samarati, Pierangela
3
Cybenko, George
2
Deswarte, Yves
2
Ghosh, Anup K.
2
List, William
2
Mazumdar, Chandan
2
McGregor, Graeme W.
2
Singhal, Anoop
2
Strous, Leon A.M.
2
Wijesekera, Duminda
2
Abou El Kalam, Anas
1
Akram, Raja Naeem
1
Albanese, Massimiliano
1
Atluri, Vijay
1
Barbará, Daniel
1
Bertino, Elisa
1
Bettini, Claudio
1
Cimato, Stelvio
1
Crampton, Jason
1
Cuppens-Boulahia, Nora
1
Duric, Zoran
1
Etzion, Opher
1
Foresti, Sara
1
George, Binto
1
Gertz, Michael
1
Johnson, Neil F.
1
Kant, Krishna
1
King, Roger B.
1
Kordy, Barbara
1
Kunii, Hideko S.
1
Mauw, Sjouke
1
Mayes, Keith
1
Peng Liu
1
Peng Ning
1
Shakarian, Paulo
1
Soelvberg, Arne
1
Spaccapietra, Stefano
1
Sripada, Suryanarayana
1
Strous, Leon
1
Wang, Sean X.
1
Wang, Xiaoyang Sean
1
Yu, Ting
1
Zhou, Jianying
1
van Tilborg, Henk C.A.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=author_facet%3A%22Jajodia%2C+Sushil%22&lookfor=%28%28%22secularity%22+OR+%22peculiarity%22%29+OR+%22security%22%29&type=AllFields
Send by Email
×
Loading...