Database and Applications Security / Edition 1
by Bhavani Thuraisingham, Bhavani M. Thuraisingham, Bhavani Thruaisingham
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing.
Divided into eight sections, each of which
… See more details belowOverview
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing.
Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging applications.
Product Details
- ISBN-13:
- 9780849322242
- Publisher:
- Taylor & Francis
- Publication date:
- 06/03/2005
- Edition description:
- New Edition
- Pages:
- 660
- Product dimensions:
- 6.20(w) x 9.40(h) x 1.50(d)
Table of Contents
1 | Introduction | 1 |
Pt. I | Supporting technologies for database and applications security | |
2 | Data management technologies | 23 |
3 | Information security | 61 |
4 | Information management technologies | 77 |
Pt. II | Discretionary security for database systems | |
5 | Security policies | 115 |
6 | Policy enforcement and related issues | 127 |
Pt. III | Mandatory security from database systems | |
7 | Historical developments | 141 |
8 | Design principles | 159 |
Pt. IV | Multilevel secure relational database systems | |
9 | Multilevel relational data models | 175 |
10 | Security impact on database functions | 187 |
11 | Prototypes and products | 197 |
Pt. V | The inference problem | |
12 | A perspective of the inference problem | 217 |
13 | Security-constraint processing for inference control | 229 |
14 | Conceptual structures for inference control | 253 |
Pt. VI | Secure distributed and heterogeneous database systems | |
15 | Discretionary security for distributed database systems | 281 |
16 | Multilevel security for distributed database systems | 295 |
17 | Secure heterogeneous and federated database systems | 309 |
Pt. VII | Secure object and multimedia systems | |
18 | Discretionary and multilevel security for object database systems | 331 |
19 | Aspects of objects and security | 349 |
20 | Secure multimedia data management systems | 361 |
Pt. VIII | Data warehousing, data mining, security, and privacy | |
21 | Secure data warehousing | 381 |
22 | Data mining for security applications | 399 |
23 | Privacy | 419 |
Pt. IX | Secure Web data and information management technologies | |
24 | Secure Web data management and digital libraries | 441 |
25 | Security for XML, RDF, and the semantic Web | 465 |
26 | Secure E-commerce, collaboration, and knowledge management | 487 |
Pt. X | Emerging secure data management technologies and applications | |
27 | Secure dependable data management | 505 |
28 | Secure sensor and wireless information management | 523 |
29 | Digital identity, forensics, and related topics | 549 |
30 | Summary and directions | 565 |
App. A | Data management systems : developments and trends | 577 |
App. B | Suggested reading : books in database systems and information security | 593 |
Customer Reviews
Average Review: