Tunable Security for Deployable Data Outsourcing

Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design phase. This book introduces a methodology that can be...

Full description

Saved in:
Bibliographic Details
Main Author: Köhler, Jens (auth)
Format: Electronic Book Chapter
Language:English
Published: KIT Scientific Publishing 2015
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_61399
005 20210212
003 oapen
006 m o d
007 cr|mn|---annan
008 20210212s2015 xx |||||o ||| 0|eng d
020 |a KSP/1000048084 
020 |a 9783731504115 
040 |a oapen  |c oapen 
024 7 |a 10.5445/KSP/1000048084  |c doi 
041 0 |a eng 
042 |a dc 
100 1 |a Köhler, Jens  |4 auth 
245 1 0 |a Tunable Security for Deployable Data Outsourcing 
260 |b KIT Scientific Publishing  |c 2015 
300 |a 1 electronic resource (XIII, 257 p. p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design phase. This book introduces a methodology that can be used to build such tunable approaches. The book shows how the proposed methodology can be applied in the domains of database outsourcing, identity management, and credential management. 
540 |a All rights reserved  |4 http://oapen.org/content/about-rights 
546 |a English 
653 |a föderatives Identitätsmanagement 
653 |a database outsourcing 
653 |a Einsetzbarkeit 
653 |a Datenbankauslagerung 
653 |a federated identity management 
653 |a deployability 
653 |a IT-Sicherheit 
653 |a credential management 
653 |a GeheimnismanagementIT security 
856 4 0 |a www.oapen.org  |u https://www.ksp.kit.edu/9783731504115  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/61399  |7 0  |z DOAB: description of the publication