Database security XII : status and prospects : IFIP TC11 WG11.3 Twelfth International Working Conference on Da
Author: IFIP TC11/WG 11.3 International Conference on Database Security (12th : 1998 : Chalkidiki, Greece), Jajodia, Sushil, editor
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Database security, Computer Science, Data Structures, Cryptology and Information Theory, Management of Computing and Information Systems, Business Information Systems, Information Storage and Retrieval, Database security
Publishers: Springer US
Collections: folkscanomy miscellaneous, folkscanomy, additional collections
ISBN Number: 9780387355641, 0387355642
Pages Count: 600
PPI Count: 600
PDF Count: 1
Total Size: 869.17 MB
PDF Size: 28.66 MB
Extensions: djvu, epub, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 955
Views: 1005
Total Files: 20
Media Type: texts
Total Files: 7
Last Modified: 2024-01-30 12:33:24
Size: 38.55 KB
Description
Author: Sushil Jajodia
Published by Springer US
ISBN: 978-1-4757-4914-4
DOI: 10.1007/978-0-387-35564-1
Table of Contents:
- E-Commerce Security: No Silver Bullet
- Technical Enforcement of Informational Assurances
- Analyzing the Safety of Workflow Authorization Models
- Rules and Patterns for Security in Workflow Systems
- An Information-Flow Model for Privacy (Infopriv)
- Security Policies in Replicated and Autonomous Databases
- Programmable Security for Object-Oriented Systems
- Secure Mediation: Requirements and Design
- Reconstructing the Database After Electronic Attacks
- Version Management in the STAR MLS Database System
- Sacaddos: A Support Tool to Manage Multilevel Documents
- Using Role-Templates for Handling Recurring Role Structures
- Role Based Security and Java
- Security Issues in Mobile Database Access
- Bayesian Methods Applied to the Database Inference Problem
- The Design and Implementation of a Data Level Database Inference Detection System
- Security and Privacy Issues for the World Wide Web: Panel Discussion
- Workshop Summary
Includes bibliographical references and index
Print version record
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce Informational Assurances Workflow Privacy Policy Modeling Mediation Information Warfare Defense Multilevel Security Role-based Access Controls Mobile Databases Inference Data Warehouses and Data Mining. This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece. Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development
I Invited Talks -- 1 E-Commerce Security: No Silver Bullet -- 2 Technical Enforcement of Informational Assurances -- II Workflow -- 3 Analyzing the Safety of Workflow Authorization Models -- 4 Rules and Patterns for Security in Workflow Systems -- III Privacy -- 5 An information-flow model for Privacy (InfoPriv) -- IV Policy Modeling -- 6 Security Policies in Replicated and Autonomous Databases -- 7 Programmable Security for Object-Oriented Systems -- V Mediation -- 8 Secure Mediation: Requirements and Design -- VI Information Warfare Defense -- 9 Reconstructing the Database after Electronic Attacks -- VII Multilevel Security -- 10 Version Management in the STAR MLS Database System -- 11 SACADDOS: a support tool to manage multilevel documents -- VIII Role-based Access Controls -- 12 Using Role-Templates for Handling Recurring Role Structures -- 13 Role Based Security and Java -- IX Mobile Databases -- 14 Security Issues in Mobile Database Access -- X Inference -- 15 Bayesian Methods Applied to the Database Inference Problem -- 16 The Design and Implementation of a Data Level Database Inference Detection System -- XI Pane -- 17 Security and Privacy Issues for the World Wide Web: Panel Discussion -- XII Discussion Summary -- 18 Workshop Summary