<p>“This book addresses this important concern in three
different scenarios: protection of data both explicitly and implicitly, and
access control enforcement. This book is based on the author’s PhD work, and
hence contains an in-depth analysis. … this is well-written material that will
be useful for researchers, scientists, and practitioners working in data
privacy and information security.” (S. Ramakrishnan, Computing Reviews, October,
2015)</p>
Introduction.- Related Work.- Enforcing Confidentiality and Visibility Constraints.- Counteracting Inferences from Sensitive Volume Distributions.- Enforcing Dynamic Read and Write Priviledges.- Conclusions.