- Shopping Bag ( 0 items )
-
All (1) from $644.88
-
Used (1) from $644.88
Ships from: Waltham Abbey, United Kingdom
Usually ships in 1-2 business days
| Preface | ||
| Special care needed for the heart of medical information systems | 3 | |
| Current trends in database technology and their impact on security concepts | 11 | |
| Access rights administration in role-based security systems | 37 | |
| User group structures in object-oriented database authorization | 57 | |
| Unifying structural and security modeling and analyses in the ADAM object-oriented design and environment | 77 | |
| The SINTRA data model: structure and operations | 97 | |
| The b2/c3 problem: how big buffers overcome covert channel cynicism in trusted database systems | 111 | |
| Trusted RUBIX: a multilevel secure client-server dbms | 123 | |
| A practical formalism for imprecise inference control | 139 | |
| Hypersemantic data modeling for inference analysis | 157 | |
| A multilevel secure federated database | 183 | |
| A new authorization model for object-oriented databases | 199 | |
| The integration of security and integrity constraints in MOKUM | 223 | |
| Field level classification and SQL | 247 | |
| Degrees of isolation, concurrency control protocols, and commit protocols | 259 | |
| Providing consistent views in a polyinstantiated database | 277 | |
| Secure logic databases allowed to reveal indefinite information on secrets | 297 | |
| A fine grained access control model for object-oriented dbms | 319 | |
| Creating abstract discretionary modification policies with reconfigurable data objects | 335 | |
| Security guidelines for database systems development | 353 | |
| Trusted ONTOS prototype: preliminary considerations | 373 | |
| Security object modelling for level-based policies | 374 | |
| Enforcement of state dependent security specifications | 375 | |
| A contemporary survey of discretionary access control policy assurance in commercial trusted relational dbms | 376 | |
| Perspectives on database security - panel summary | 377 | |
| Summary of the conference discussions - Eighth IFIP WG 11.3 Conference on Database Security | 393 | |
| Research question list IFIP WG 11.3 Database Security | 403 |