did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780792375142

Data and Application Security

by ; ; ;
  • ISBN13:

    9780792375142

  • ISBN10:

    0792375149

  • Format: Hardcover
  • Copyright: 2001-10-01
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $279.99 Save up to $209.45
  • Digital
    $152.83
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.

Table of Contents

Preface ix
List of Contributors
xi
Keynote I Protecting Information when Access is Granted for Collaboration
1(14)
Gio Wiederhold
Author X: A Java-Based System for XML Data Protection
15(12)
E. Bertino
M. Braun
S. Castano
B. Ferrari
M Mesiti
A Fair-Exchange E-Commerce Protocol with Automated Dispute Resolution
27(12)
Indrajit Ray
Indrakshi Ray
Natarajan Narasimhamurthi
XML Access Control Systems: A Component-Based Approach
39(12)
E. Damiani
S. De Capitani di Vimercati
S. Paraboschi
P. Samarati
A Configurable Security Architecture Prototype
51(12)
Alexandre Hardy
Martin S. Olivier
Distributed Policies for Data Management - Making Policies Mobile
63(14)
Susan Chapin
Don Faatz
Sushil Jajodia
Security Architecture of the Multimedia Mediator
77(12)
Christian Altenschmidt
Joachim Biskup
Yucel Karabulut
Simulation and Analysis of Cryptographic Protocols
89(11)
M. Papa
O. Bremer
S. Magill
J. Hale
S. Shenoi
Authentic Third-Party Data Publication
100(13)
Premkumar Devanbu
Michael Gertz
Charles Martel
Stuart G. Stubblebine
Protecting File Systems Against Corruption Using Checksums
113(12)
Daniel Barbara
Rajni Goel
Sushil Jajodia
Web Security and Privacy, Panel I
125(2)
Bhavani Thuraisingham
Keynote II Coordinating Policy for Federated Applications
127(8)
Ken Moody
Integrating Multilevel Security Policies in Multilevel Federated Database Systems
135(14)
Marta Oliva
Felix Saltor
Wrappers - A Mechanism to Support State-Based Authorization in Web Applications
149(12)
Martin S. Olivier
Ehud Gudes
An Integrated Framework for Database Privacy Protection
161(12)
LiWu Chang
Ira S. Moskowitz
Discovery of Multi-level Security Policies
173(12)
Christina Yip Chung
Michael Gertz
Karl Levitt
Protecting Deductive Databases from Unauthorized Retrievals
185(12)
Steve Barker
Confidentiality vs Integrity in Secure Databases
197(12)
Adrian Spalka
Armin B. Cremers
Extending SQL's Grant Operation to Limit Privileges
209(12)
Arnon Rosenthal
Edward Sciore
Language Extensions for Programmable Security
221(12)
J. Hale
R. Chandia
C. Campbell
M. Papa
S. Shenoi
Protecting Privacy from Continuous High-Resolution Satellite Surveillance
233(12)
Soon Ae Chun
Vijayalakshmi Atluri
Database Security Integration Using Role-Based Access Control
245(14)
Sylvia Osborn
User Role-Based Security Model for a Distributed Environment
259(12)
S. Demurjian
T.C. Ting
J. Balthazar
H. Ren
C. Phillips
P. Barr
WorkFlow Analyzed for Security and ~Privacy in using Databases
271(12)
Wouter Teepe
Reind van de Riet
Martin Olivier
Identifying Security Holes in OLAP Applications
283(12)
Jurgen Steger
Holger Gunzel
Andreas Bauer
Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations
295(22)
Marc Donner
David Nochlin
Dennis Shasha
Wendy Walasek
Database Security 2000
317(6)
John R. Campbell
Declarative Semantics of Belief Queries in MLS Deductive Databases
323(6)
Hasan M. Jamil
Trust Management in Distributed Databases
329(10)
James B. Michael
Leonard T. Gaines
Active Authorization as High-level Control
339(8)
Daniel Cvrcek
Conference Key Agreement Protocol using Oblivious Transfer
347(8)
Ari Moesriami Barmawi
Shingo Takada
Norihisa Doi
An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task
355(6)
Sejong Oh
Soeg Park
Authorization Model in Object-Oriented Systems
361(6)
Keiji Izaki
Katsuya Tanaka
Makoto Takizawa
Panel 2
367(6)
Reind van de Riet
Raban Serban
Sylvia Osborn
Arnie Rosenthal
Vijay Atluri
Joachim Biskup
Gio Wiederhold
Conference Summary
373(2)
Bhavani Thuraisingham
Index 375

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program