Tunable Security for Deployable Data Outsourcing
Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design phase. This book introduces a methodology that can be...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
KIT Scientific Publishing
2015
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_61399 | ||
005 | 20210212 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210212s2015 xx |||||o ||| 0|eng d | ||
020 | |a KSP/1000048084 | ||
020 | |a 9783731504115 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5445/KSP/1000048084 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
100 | 1 | |a Köhler, Jens |4 auth | |
245 | 1 | 0 | |a Tunable Security for Deployable Data Outsourcing |
260 | |b KIT Scientific Publishing |c 2015 | ||
300 | |a 1 electronic resource (XIII, 257 p. p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design phase. This book introduces a methodology that can be used to build such tunable approaches. The book shows how the proposed methodology can be applied in the domains of database outsourcing, identity management, and credential management. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
653 | |a föderatives Identitätsmanagement | ||
653 | |a database outsourcing | ||
653 | |a Einsetzbarkeit | ||
653 | |a Datenbankauslagerung | ||
653 | |a federated identity management | ||
653 | |a deployability | ||
653 | |a IT-Sicherheit | ||
653 | |a credential management | ||
653 | |a GeheimnismanagementIT security | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.ksp.kit.edu/9783731504115 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/61399 |7 0 |z DOAB: description of the publication |