
Database Security / Edition 1
by Silvana Castano, Silvana Castano, Giancarlo Martella, Maria Grazia Fugini, Pierangela SamaratiISBN-10: 0201593750
ISBN-13: 9780201593754
Pub. Date: 06/15/1994
Publisher: Addison-Wesley
Product Details
- ISBN-13:
- 9780201593754
- Publisher:
- Addison-Wesley
- Publication date:
- 06/15/1994
- Series:
- ACM Press Series
- Pages:
- 480
- Product dimensions:
- 6.32(w) x 9.51(h) x 1.19(d)
Table of Contents
Information Security. Introduction.
Introduction to Databases.
Security Problems in Databases.
Security Controls.
Conclusions.
Introduction to Databases.
Security Problems in Databases.
Security Controls.
Conclusions.
Security Models.
Introduction.
Access Matrix Model.
Take-Grant Model.
Acten Model.
PN Model.
Hartson and Hsiao's Model.
Fernandez's Model.
Bussolati and Martella's Model for Distributed databases.
Bell and LaPadula's Model.
Biba's Model.
Dion's Model.
Sea View Model.
Jajodia and Sandhu's Model.
The Lattice Model for the Flow Control.
Conclusion.
Access Matrix Model.
Take-Grant Model.
Acten Model.
PN Model.
Hartson and Hsiao's Model.
Fernandez's Model.
Bussolati and Martella's Model for Distributed databases.
Bell and LaPadula's Model.
Biba's Model.
Dion's Model.
Sea View Model.
Jajodia and Sandhu's Model.
The Lattice Model for the Flow Control.
Conclusion.
Security Mechanisms.
Introduction.
User Identification/Authentication.
Memory Protection.
Resource Protection.
Control Flow Mechanisms.
Isolation.
Security Functionalities in Some Operating Systems.
Trusted Computer System Evaluation Criteria.
User Identification/Authentication.
Memory Protection.
Resource Protection.
Control Flow Mechanisms.
Isolation.
Security Functionalities in Some Operating Systems.
Trusted Computer System Evaluation Criteria.
Security Software Design.
Introduction.
A Methodological Approach to Security Software Design.
Secure Operating System Design.
Secure DBMS Design.
Security Packages.
Database Security Design.
A Methodological Approach to Security Software Design.
Secure Operating System Design.
Secure DBMS Design.
Security Packages.
Database Security Design.
Statistical Database Protection.
Introduction.
Statistics Concepts and Definitions.
Types of Attacks.
Inference Controls.
evaluation Criteria for Control Comparison.
Statistics Concepts and Definitions.
Types of Attacks.
Inference Controls.
evaluation Criteria for Control Comparison.
Intrusion Detection Systems.
Introduction.
IDES System.
RETISSSystem.
ASES System.
Discovery.
IDES System.
RETISSSystem.
ASES System.
Discovery.
Models For The Protection Of New Generation Database Systems.
Introduction.
A Model for the Protection of Frame Based Systems.
A Model for the Protection of Object-Oriented Systems.
SORION Model for the Protection of Object-Oriented Databases.
a Model for the Protection of New Generation Database Systems: the Orion Model.
Jajodia and Kogan's Model.
A Model for the Protection of Active Databases.
Conclusions.
A Model for the Protection of Frame Based Systems.
A Model for the Protection of Object-Oriented Systems.
SORION Model for the Protection of Object-Oriented Databases.
a Model for the Protection of New Generation Database Systems: the Orion Model.
Jajodia and Kogan's Model.
A Model for the Protection of Active Databases.
Conclusions.
Customer Reviews
Average Review: