rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780201593754

Database Security

by ; ; ; ;
  • ISBN13:

    9780201593754

  • ISBN10:

    0201593750

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 1994-11-11
  • Publisher: Addison-Wesley Professional
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $54.99

Summary

The competitive edge of many companies and public trust in government institutions can often depend on the security of the information now held in databases. Breaches of that security are a highly topical issue for both designers and users of database systems. This book provides an authoritative account of security issues in database systems, and shows how current commercial or future systems may be designed to ensure both integrity and confidentiality. It gives a full account of alternative security models and protection measures, including those for new-generation systems like distributed, frame-based and object-oriented databases. The book can serve as a text for advanced courses on DB Security.

Table of Contents

Information Security
Introduction
Introduction to Databases Security
Problems in Databases Security Controls Conclusions
Security Models
Introduction Access
Matrix Model
Take-Grant Model
Acten Model PN Model
Hartson and Hsiao's Model
Fernandez's Model
Bussolati and Martella's Model for Distributed databases
Bell and LaPadula's Model
Biba's Model
Dion's Model
Sea View Model
Jajodia and Sandhu's Model
The Lattice Model for the Flow Control conclusion
Security Mechanisms
Introduction User Identification/Authentication
Memory Protection
Resource Protection
Control Flow Mechanisms
Isolation Security Functionalities in Some Operating Systems
Trusted Computer System Evaluation Criteria
Security Software Design
Introduction A Methodological Approach to Security
Software Design Secure
Operating System Design Secure
DBMS Design Security Packages
Database Security Design
Statistical Database Protection
Introduction Statistics Concepts and Definitions
Types of Attacks Inference Controls evaluation
Criteria for Control Comparison
Intrusion Detection Systems
Introduction IDES System RETISS System ASES System Discovery
Models For The Protection Of New Generation Database Systems
Introduction A Model for the Protection of Frame Based Systems
A Model for the Protection of Object-Oriented Systems
SORION Model for the Protection of Object-Oriented
Databases a Model for the Protection of New Generation
Database Systems: the Orion Model Jajodia and Kogan's Model
A Model for the Protection of Active Databases
Conclusions
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program