Tunable Security for Deployable Data Outsourcing
Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design phase. This book introduces a methodology that can be...
Saved in:
Main Author: | Köhler, Jens (auth) |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
KIT Scientific Publishing
2015
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Informationskonsistenz im föderativen Identitätsmanagement: Modellierung und Mechanismen
by: Höllrigl, Thorsten
Published: (2011) -
Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping with the Challenges of Multi-Party Systems
by: Jünemann, Konrad
Published: (2015) -
Data Service Outsourcing and Privacy Protection in Mobile Internet
Published: (2018) -
Netzwerk- und IT-Sicherheitsmanagement : eine Einführung
by: Dinger, JochenHartenstein, Hannes
Published: (2008) -
Chapter Outsourcing Rules in the Public and the Private Sector
by: Grubišić Šeba, Mihaela
Published: (2018)