rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780792378488

Research Advances in Database and Information Systems Security: Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security, July 25-28, 1999, Seattle, Washington, USA

by ;
  • ISBN13:

    9780792378488

  • ISBN10:

    0792378482

  • Format: Hardcover
  • Copyright: 2000-05-01
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
List Price: $179.00 Save up to $143.36
  • Digital
    $77.22
    Add to Cart

    DURATION
    PRICE

Summary

Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for the whole of society. Research Advances in Database and Information Systems Security covers issues related to security and privacy of information in a wide range of applications, including: Critical Infrastructure Protection; Electronic Commerce; Information Assurance; Intrusion Detection; Workflow; Policy Modeling; Multilevel Security; Role-Based Access Control; Data Mining; Data Warehouses; Temporal Authorization Models; Object-Oriented Databases. This book contains papers and panel discussions from the Thirteenth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 25-28, 1999, in Seattle, Washington, USA. Research Advances in Database and Information Systems Security provides invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners engaged in database security research and development.

Author Biography

Vijay Atluri is an Assistant Professor of Computer Information Systems and Member of the Center for Information Management, Integration and Connectivity in the Management Science and Information Systems Department at Rutgers University, Newark, NJ, USAJohn Hale is an Assistant Professor of Computer Science and Director of the Center for Information Security at the University of Tulsa, Tulsa, OK, USA.

Table of Contents

List of Figures
ix
List of Tables
xii
Preface xiii
Contributing Authors xv
Part I Intrusion Detection
Intrusion Confinement by Isolation in Information Systems
3(16)
Peng Liu
Sushil Jajodia
Catherine D. McCollum
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection
19(14)
Anup K. Ghosh
Aaron Schwartzbard
Integrating Data Mining Techniques with Intrusion Detection Methods
33(16)
Ravi Mukkamala
Jason Gagnon
Sushil Jajodia
Part II Role-Based Access Control
RBAC on the Web by Secure Cookies
49(14)
Joon S. Park
Ravi Sandhu
SreeLatha Ghanta
eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features
63(16)
Ioannis Mavridis
George Pangalos
Marie Khair
Software Agents for Role Based Security
79(18)
S. Demurjian, Sr.
Y. He
T. C. Ting
M. Saba
Part III Critical Infrastructure Protection Panel
Selected Topics in Infrastructure and Information Assurance
97(20)
William V. Maconachy
Thomas Harper
Donald G. Marks
Terry Mayfield Chair
Part IV Policy/Modeling
A Secret Splitting Method for Assuring the Confidentiality of Electronic Records
117(10)
Andrew Po-Jung Ho
For Unknown Secrecies Refusal is Better than Lying
127(18)
Joachim Biskup
Part V Workflow Systems
Extending The BFA Workflow Authorization Model to Express Weighted Voting
145(16)
Savith Kandala
Ravi Sandhu
A Strategy for an MLS Workflow Management System
161(16)
Myong H. Kang
Judith N. Froscher
Brian J. Eppinger
Ira S. Moskowitz
Part VI Data Mining/Data Warehousing
Impact of Decision-Region Based Classification Mining Algorithms on Database Security
177(16)
Tom Johnsten
Vijay V. Raghavan
Protecting Against Data Mining through Samples
193(16)
Chris Clifton
Security Administration for Federations, Warehouses, and other Derived Data
209(18)
Arnon Rosenthal
Edward Sciore
Vinti Doshi
Part VII Intrusion Detection Panel
Panel on Intrusion Detection
227(10)
TC Ting
Ming-Yuh Huang
D. Shayne Pitcock
Chris Clifton
T.Y. Lin Chair
Part VIII Multilevel Security
Enforcing Integrity While Maintaining Secrecy
237(16)
Donald G. Marks
The Effect of Confidentiality on the Structure of Databases
253(18)
Adrian Spalka
Armin B. Cremers
Part IX Temporal Authorization Models
Temporal Authorization in the Simplified Event Calculus
271(14)
Steve Barker
Specifying and Computing Hierarchies of Temporal Authorizations
285(18)
E. Bertino
P.A. Bonatti
E. Ferrari
M.L. Sapino
Part X Object-Oriented Databases
The Security Problem against Inference Attacks on Object-Oriented Databases
303(14)
Yasunori Ishihara
Toshiyuki Morita
Minoru Ito
A Logical Formalization for Specifying Authorizations in Object-Oriented Databases
317(14)
Yun Bai
Vijay Varadharajan
Index 331

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program