did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780412820908

Database Security XI

by ; ; ;
  • ISBN13:

    9780412820908

  • ISBN10:

    0412820900

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 1999-04-01
  • Publisher: Springer Verlag
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $224.00

Summary

This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students with a broad perspective of recent developments in what is recognised as a key topic in business and in the public sector.

Table of Contents

Preface vi
PART 1 Novel Systems
Security issues in data warehousing and data mining: panel discussion
3(14)
B. Thuraisingham
L. Schlipper
P. Samarati
T.Y. Lin
S. Jajodia
C. Clifton
Distributed object technologies, databases and security
17(18)
C.D. McCollum
D.B. Faatz
W.R. Herndon
E.J. Sebes
R.K. Thomas
PART 2 Distributed and Federated Systems
Designing security agents for the DOK federated system
35(25)
Z. Tari
Web implementation of a security mediator for medical databases
60(13)
G. Wiederhold
M. Bilello
C. Donahue
Supporting the requirements for multilevel secure and real-time databases in distributed environments
73(22)
S.H. Son
C. Chaney
PART 3 Object-Oriented Systems
A Principled approach to object deletion and garbage collection in a multi-level secure object bases
95(15)
E. Bertino
E. Ferrari
Compile-time flow analysis of transactions and methods in object-oriented databases
110(24)
M. Gendler-Fishman
E. Gudes
Capability-based primitives for access control in object-oriented systems
134(17)
J. Hale
J. Threet
S. Shenoi
PART 4 Work flow
An execution model for multilevel secure workflows
151(15)
V. Atluri
W. Huang
E. Bertino
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management
166(16)
R.K. Thomas
R.S. Sandhu
Alter-egos and roles: supporting workflow security in cyberspaces
182(17)
E. Gudes
R.P. van de Riet
H.F.M. Burg
M. Olivier
PART 5 Architectures and Systems
A Two-tier coarse indexing scheme for MLS database systems
199(20)
S. Jajodia
R. Mukkamala
I. Ray
Replication does survive information warfare attacks
219(10)
J. McDermott
Priority-driven secure multiversion locking protocol for real-time secure database systems
229(18)
C. Park
S. Park
S. Son
PART 6 Role-based Access Control
Software architectural alternatives for user role-based security policies
247(15)
S. Demurjian
T.C. Ting
J. Reisner
The URA97 model for role-based user-role assignment
262(17)
R. Sandhu
V. Bhamidipati
PART 7 Multilevel Security
IRI: a quantitative approach to inference analysis in relational databases
279(12)
K. Zhang
Structured name-spaces in secure databases
291(16)
A. Spalka
A.B. Cremers
Multilevel deccision logic: a formalism for rules mining
307(18)
T.Y. Lin
X. Zuo
PART 8 Policy Modeling
Access controls by object-oriented concepts
325(16)
W. Essmayr
G. Pernul
A.M. Tjoa
Administration policies in a multipolicy authorization system
341(15)
E. Bertino
E. Ferrari
Datafly: a system for providing anonymity in medical data
356(29)
L. Sweeney
PART 9 System Implementations
An environment for developing securely interoperable heterogeneous distributed objects
385(4)
M. Berryman
C. Rummel
M. Papa
J. Hale
J. Threet
S. Shenoi
Implementing advanced internet search engines
389(4)
G. Lorenz
S. Dangi
D. Jones
P. Carpenter
S. Shenoi
Index of contributors 393(2)
Keyword index 395

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program