Ebook: Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada
- Tags: Data Structures Cryptology and Information Theory, Theory of Computation, Management of Computing and Information Systems, Processor Architectures
- Series: IFIP — The International Federation for Information Processing 87
- Year: 2002
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern in business, industry, government and society. These concerns are compounded by the expanding use of the Internet and wireless communication technologies.
This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:
- Access control models;
- Role and constraint-based access control;
- Distributed systems;
- Information warfare and intrusion detection;
- Relational databases;
- Implementation issues;
- Multilevel systems;
- New application areas including XML.
Database and Application Security XV contains papers, keynote addresses, and panel discussions from the Fifteenth Annual Working Conference on Database and Application Security, organized by the International Federation for Information Processing (IFIP) Working Group 11.3 and held July 15-18, 2001 in Niagara on the Lake, Ontario, Canada.
Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern in business, industry, government and society. These concerns are compounded by the expanding use of the Internet and wireless communication technologies.
This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:
- Access control models;
- Role and constraint-based access control;
- Distributed systems;
- Information warfare and intrusion detection;
- Relational databases;
- Implementation issues;
- Multilevel systems;
- New application areas including XML.
Database and Application Security XV contains papers, keynote addresses, and panel discussions from the Fifteenth Annual Working Conference on Database and Application Security, organized by the International Federation for Information Processing (IFIP) Working Group 11.3 and held July 15-18, 2001 in Niagara on the Lake, Ontario, Canada.
Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern in business, industry, government and society. These concerns are compounded by the expanding use of the Internet and wireless communication technologies.
This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:
- Access control models;
- Role and constraint-based access control;
- Distributed systems;
- Information warfare and intrusion detection;
- Relational databases;
- Implementation issues;
- Multilevel systems;
- New application areas including XML.
Database and Application Security XV contains papers, keynote addresses, and panel discussions from the Fifteenth Annual Working Conference on Database and Application Security, organized by the International Federation for Information Processing (IFIP) Working Group 11.3 and held July 15-18, 2001 in Niagara on the Lake, Ontario, Canada.
Content:
Front Matter....Pages i-x
Front Matter....Pages 1-1
Recent Advances in Access Control Models....Pages 3-15
Front Matter....Pages 17-17
Role-Based Access Control on the Web Using LDAP....Pages 19-30
Constraints-Based Access Control....Pages 31-44
Secure Role-Based Workflow Models....Pages 45-58
Front Matter....Pages 59-59
Subject Switching Algorithms for Access Control in Federated Databases....Pages 61-74
Efficient Damage Assessment and Repair in Resilient Distributed Database Systems....Pages 75-89
Administering Permissions for Distributed Data: Factoring and Automated Inference....Pages 91-104
State-Dependent Security Decisions for Distributed Object-Systems....Pages 105-118
Front Matter....Pages 119-119
Reorganization of the Database Log for Information Warfare Data Recovery....Pages 121-134
Randomly Roving Agents for Intrusion Detection....Pages 135-149
Public Telephone Network Vulnerabilities....Pages 151-164
Front Matter....Pages 165-165
Flexible Security Policies in SQL....Pages 167-180
The Inference Problem and Updates in Relational Databases....Pages 181-194
Managing Classified Documents in a Relational Database....Pages 195-208
Front Matter....Pages 209-209
A Comparison Between ConSA and Current Linux Security Implementations....Pages 211-224
A Novel Approach to Certificate Revocation Management....Pages 225-238
ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications....Pages 239-252
Front Matter....Pages 253-253
An Extended Transaction Model Approach for Multilevel Secure Transaction Processing....Pages 255-268
Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System....Pages 269-282
Front Matter....Pages 283-283
Security Procedures for Classification Mining Algorithms....Pages 285-297
Front Matter....Pages 283-283
Regulating Access to XML Documents....Pages 299-314
Front Matter....Pages 315-315
Panel on XML and Security....Pages 317-323
Selected Summary of Discussions....Pages 325-335
Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern in business, industry, government and society. These concerns are compounded by the expanding use of the Internet and wireless communication technologies.
This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:
- Access control models;
- Role and constraint-based access control;
- Distributed systems;
- Information warfare and intrusion detection;
- Relational databases;
- Implementation issues;
- Multilevel systems;
- New application areas including XML.
Database and Application Security XV contains papers, keynote addresses, and panel discussions from the Fifteenth Annual Working Conference on Database and Application Security, organized by the International Federation for Information Processing (IFIP) Working Group 11.3 and held July 15-18, 2001 in Niagara on the Lake, Ontario, Canada.
Content:
Front Matter....Pages i-x
Front Matter....Pages 1-1
Recent Advances in Access Control Models....Pages 3-15
Front Matter....Pages 17-17
Role-Based Access Control on the Web Using LDAP....Pages 19-30
Constraints-Based Access Control....Pages 31-44
Secure Role-Based Workflow Models....Pages 45-58
Front Matter....Pages 59-59
Subject Switching Algorithms for Access Control in Federated Databases....Pages 61-74
Efficient Damage Assessment and Repair in Resilient Distributed Database Systems....Pages 75-89
Administering Permissions for Distributed Data: Factoring and Automated Inference....Pages 91-104
State-Dependent Security Decisions for Distributed Object-Systems....Pages 105-118
Front Matter....Pages 119-119
Reorganization of the Database Log for Information Warfare Data Recovery....Pages 121-134
Randomly Roving Agents for Intrusion Detection....Pages 135-149
Public Telephone Network Vulnerabilities....Pages 151-164
Front Matter....Pages 165-165
Flexible Security Policies in SQL....Pages 167-180
The Inference Problem and Updates in Relational Databases....Pages 181-194
Managing Classified Documents in a Relational Database....Pages 195-208
Front Matter....Pages 209-209
A Comparison Between ConSA and Current Linux Security Implementations....Pages 211-224
A Novel Approach to Certificate Revocation Management....Pages 225-238
ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications....Pages 239-252
Front Matter....Pages 253-253
An Extended Transaction Model Approach for Multilevel Secure Transaction Processing....Pages 255-268
Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System....Pages 269-282
Front Matter....Pages 283-283
Security Procedures for Classification Mining Algorithms....Pages 285-297
Front Matter....Pages 283-283
Regulating Access to XML Documents....Pages 299-314
Front Matter....Pages 315-315
Panel on XML and Security....Pages 317-323
Selected Summary of Discussions....Pages 325-335
....