Ebook: Database Security XII: Status and Prospects
- Tags: Data Structures Cryptology and Information Theory, Management of Computing and Information Systems, Business Information Systems, Information Storage and Retrieval
- Series: IFIP — The International Federation for Information Processing 14
- Year: 1999
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society.
Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including:
- Electronic Commerce
- Informational Assurances
- Workflow
- Privacy
- Policy Modeling
- Mediation
- Information Warfare Defense
- Multilevel Security
- Role-based Access Controls
- Mobile Databases
- Inference
- Data Warehouses and Data Mining.
This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece.
Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.
Content:
Front Matter....Pages i-xx
Front Matter....Pages 1-1
E-Commerce Security: No Silver Bullet....Pages 3-16
Technical Enforcement of Informational Assurances....Pages 17-40
Front Matter....Pages 41-41
Analyzing the Safety of Workflow Authorization Models....Pages 43-57
Rules and Patterns for Security in Workflow Systems....Pages 59-74
Front Matter....Pages 75-75
An Information-Flow Model for Privacy (Infopriv)....Pages 77-90
Front Matter....Pages 91-91
Security Policies in Replicated and Autonomous Databases....Pages 93-107
Programmable Security for Object-Oriented Systems....Pages 109-123
Front Matter....Pages 125-125
Secure Mediation: Requirements and Design....Pages 127-140
Front Matter....Pages 141-141
Reconstructing the Database After Electronic Attacks....Pages 143-156
Front Matter....Pages 157-157
Version Management in the STAR MLS Database System....Pages 159-171
Sacaddos: A Support Tool to Manage Multilevel Documents....Pages 173-188
Front Matter....Pages 189-189
Using Role-Templates for Handling Recurring Role Structures....Pages 191-204
Role Based Security and Java....Pages 205-219
Front Matter....Pages 221-221
Security Issues in Mobile Database Access....Pages 223-234
Front Matter....Pages 235-235
Bayesian Methods Applied to the Database Inference Problem....Pages 237-251
The Design and Implementation of a Data Level Database Inference Detection System....Pages 253-266
Front Matter....Pages 267-267
Security and Privacy Issues for the World Wide Web: Panel Discussion....Pages 269-284
Front Matter....Pages 285-285
Workshop Summary....Pages 287-293
Back Matter....Pages 295-296
Content:
Front Matter....Pages i-xx
Front Matter....Pages 1-1
E-Commerce Security: No Silver Bullet....Pages 3-16
Technical Enforcement of Informational Assurances....Pages 17-40
Front Matter....Pages 41-41
Analyzing the Safety of Workflow Authorization Models....Pages 43-57
Rules and Patterns for Security in Workflow Systems....Pages 59-74
Front Matter....Pages 75-75
An Information-Flow Model for Privacy (Infopriv)....Pages 77-90
Front Matter....Pages 91-91
Security Policies in Replicated and Autonomous Databases....Pages 93-107
Programmable Security for Object-Oriented Systems....Pages 109-123
Front Matter....Pages 125-125
Secure Mediation: Requirements and Design....Pages 127-140
Front Matter....Pages 141-141
Reconstructing the Database After Electronic Attacks....Pages 143-156
Front Matter....Pages 157-157
Version Management in the STAR MLS Database System....Pages 159-171
Sacaddos: A Support Tool to Manage Multilevel Documents....Pages 173-188
Front Matter....Pages 189-189
Using Role-Templates for Handling Recurring Role Structures....Pages 191-204
Role Based Security and Java....Pages 205-219
Front Matter....Pages 221-221
Security Issues in Mobile Database Access....Pages 223-234
Front Matter....Pages 235-235
Bayesian Methods Applied to the Database Inference Problem....Pages 237-251
The Design and Implementation of a Data Level Database Inference Detection System....Pages 253-266
Front Matter....Pages 267-267
Security and Privacy Issues for the World Wide Web: Panel Discussion....Pages 269-284
Front Matter....Pages 285-285
Workshop Summary....Pages 287-293
Back Matter....Pages 295-296
....
Download the book Database Security XII: Status and Prospects for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)