did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781402075414

Research Directions in Data and Applications Security

by ;
  • ISBN13:

    9781402075414

  • ISBN10:

    1402075413

  • Format: Hardcover
  • Copyright: 2003-07-01
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $159.99 Save up to $126.58
  • Digital
    $72.39
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Security and privacy are paramount concerns in database systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunications networks are providing incredible connectivity, myriad applications and, of course, new threats. Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: -Role-Based Access Control; -Database Security; -XML Security; -Data Mining and Inference; -Multimedia System Security; -Network Security; -Public Key Infrastructure; -Formal Methods and Protocols; -Security and Privacy. This book is the sixteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Application Security. It presents a selection of twenty-five updated and edited papers from the Sixteenth Annual IFIP WG 11.3 Conference on Data and Application Security, held at King's College, Cambridge, U.K. in July 2002. The papers demonstrate the richness and vitality of the discipline, and offer directions for future research efforts in data and applications security. Research Directions in Data and Applications Security is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.

Table of Contents

Contributing Authors
Preface
Role-Based Access Control
Shielding RBAC Infrastructures from Cyberterrorism
Privelege Administration for the Role Graph Model
Implementing RBAC Policies
Role Delegation for a Resource-Based Security Model
Using X.509 Attribute Certificates for Role-Based EAM
Implementing Workflow Systems
Database Security
Multiphase Damage Confinement System for Databases
Analyzing Transaction Logs for Effective Damage Assessment
Deductive Database Security
XML Security
Towards Secure XML Federations
Secure XML Views
Distributed Cooperative Updates of XML Documents
Data Mining and Inference
On Security and Privacy Risks in Association Mining Algorithms
Mining Malicious Corruption of Data with Hidden Markov Models
A Study of Inference Problems in Distributed Databases
Multimedia System Security
Uniform Indexing for Geospatial Data and Authorizations
Access Control of SVG Documents
Network Security
On Modeling Computer Networks for Vulnerability Analysis
On-Line Intrusion Protection by Detecting Attacks with Diversity
Public Key Infrastructure
Recertification: A Technique to Improve Services in PKI
A Hybrid PKI Model: Application to Secure Mediation
Formal Methods and Protocols
Implementation and Verification of Programmable Security
A Process Algebraic Approach to Security Policies
Anonymous and Secure Multicast Subscription
Security and Privacy
Privacy and Civil Liberties
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program