- Shopping Bag ( 0 items )
-
All (1) from $644.88
-
Used (1) from $644.88
Ships from: Waltham Abbey, United Kingdom
Usually ships in 1-2 business days
Preface | ||
Special care needed for the heart of medical information systems | 3 | |
Current trends in database technology and their impact on security concepts | 11 | |
Access rights administration in role-based security systems | 37 | |
User group structures in object-oriented database authorization | 57 | |
Unifying structural and security modeling and analyses in the ADAM object-oriented design and environment | 77 | |
The SINTRA data model: structure and operations | 97 | |
The b2/c3 problem: how big buffers overcome covert channel cynicism in trusted database systems | 111 | |
Trusted RUBIX: a multilevel secure client-server dbms | 123 | |
A practical formalism for imprecise inference control | 139 | |
Hypersemantic data modeling for inference analysis | 157 | |
A multilevel secure federated database | 183 | |
A new authorization model for object-oriented databases | 199 | |
The integration of security and integrity constraints in MOKUM | 223 | |
Field level classification and SQL | 247 | |
Degrees of isolation, concurrency control protocols, and commit protocols | 259 | |
Providing consistent views in a polyinstantiated database | 277 | |
Secure logic databases allowed to reveal indefinite information on secrets | 297 | |
A fine grained access control model for object-oriented dbms | 319 | |
Creating abstract discretionary modification policies with reconfigurable data objects | 335 | |
Security guidelines for database systems development | 353 | |
Trusted ONTOS prototype: preliminary considerations | 373 | |
Security object modelling for level-based policies | 374 | |
Enforcement of state dependent security specifications | 375 | |
A contemporary survey of discretionary access control policy assurance in commercial trusted relational dbms | 376 | |
Perspectives on database security - panel summary | 377 | |
Summary of the conference discussions - Eighth IFIP WG 11.3 Conference on Database Security | 393 | |
Research question list IFIP WG 11.3 Database Security | 403 |