Information Security | |
Introduction | |
Introduction to Databases Security | |
Problems in Databases Security Controls Conclusions | |
Security Models | |
Introduction Access | |
Matrix Model | |
Take-Grant Model | |
Acten Model PN Model | |
Hartson and Hsiao's Model | |
Fernandez's Model | |
Bussolati and Martella's Model for Distributed databases | |
Bell and LaPadula's Model | |
Biba's Model | |
Dion's Model | |
Sea View Model | |
Jajodia and Sandhu's Model | |
The Lattice Model for the Flow Control conclusion | |
Security Mechanisms | |
Introduction User Identification/Authentication | |
Memory Protection | |
Resource Protection | |
Control Flow Mechanisms | |
Isolation Security Functionalities in Some Operating Systems | |
Trusted Computer System Evaluation Criteria | |
Security Software Design | |
Introduction A Methodological Approach to Security | |
Software Design Secure | |
Operating System Design Secure | |
DBMS Design Security Packages | |
Database Security Design | |
Statistical Database Protection | |
Introduction Statistics Concepts and Definitions | |
Types of Attacks Inference Controls evaluation | |
Criteria for Control Comparison | |
Intrusion Detection Systems | |
Introduction IDES System RETISS System ASES System Discovery | |
Models For The Protection Of New Generation Database Systems | |
Introduction A Model for the Protection of Frame Based Systems | |
A Model for the Protection of Object-Oriented Systems | |
SORION Model for the Protection of Object-Oriented | |
Databases a Model for the Protection of New Generation | |
Database Systems: the Orion Model Jajodia and Kogan's Model | |
A Model for the Protection of Active Databases | |
Conclusions | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.