Database Security XII: Status and Prospects / Edition 1

Hardcover (Print)
Buy New
Buy New from BN.com
$193.58
Buy Used
Buy Used from BN.com
$172.80
(Save 28%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 99%)
Other sellers (Hardcover)
  • All (8) from $1.99   
  • New (1) from $224.64   
  • Used (7) from $1.99   

Overview

New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society.
Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including:

  • Electronic Commerce
  • Informational Assurances
  • Workflow
  • Privacy
  • Policy Modeling
  • Mediation
  • Information Warfare Defense
  • Multilevel Security
  • Role-based Access Controls
  • Mobile Databases
  • Inference
  • Data Warehouses and Data Mining.

This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece.
Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.
Read More Show Less

Product Details

Meet the Author

Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA
Read More Show Less

Table of Contents

List of Figures. List of Tables. Preface. Contributing Authors. Part I: Invited Talks. 1. E-Commerce Security: No Silver Bullet; A.K. Ghosh. 2. Technical Enforcement of Informational Assurances; J. Biskup. Part II: Workflow. 3. Analyzing the Safety of Workflow Authorization Models; W.-K. Huang, V. Atluri. 4. Rules and Patterns for Security in Workflow Systems; S. Castano, M.G. Fugini. Part III: Privacy. 5. An information-flow model for Privacy (InfoPriv); L.C.J. Dreyer, M.S. Olivier. Part IV: Policy Modeling. 6. Security Policies in Replicated and Autonomous Databases; E. Gudes, M.S. Olivier. 7. Programmable Security for Object-Oriented Systems; J. Hale, et al. Part V: Mediation. 8. Secure Mediation: Requirements and Design; J. Biskup, et al. Part VI: Information Warfare Defense. 9. Reconstructing the Database after Electronic Attacks; B. Panda, J. Giordano. Part VII: Multilevel Security. 10. Version Management in the STAR MLS Database System; R. Sripada, T.F. Keefe. 11. SACADDOS: a support tool to manage multilevel documents; J. Carrère, et al. Part VIII: Role-based Access Controls. 12. Using Role-Templates for Handling Recurring Role Structures; W. Essmayr, et al. 13. Role Based Security and Java; D. Smarkusky, et al. Part IX: Mobile Databases. 14. Security Issues in Mobile Database Access; A. Lubinski. Part X: Inference. 15. Bayesian Methods Applied to the Database Inference Problem; L.W. Chang, I.S. Moskowitz. 16. The Design and Implementation of a Data Level Database Inference Detection System; R.W. Yip, K.N. Levitt. Part XI: Panel. 17. Security and Privacy Issues for the World Wide Web: Panel Discussion; B. Thuraisingham, et al. Part XII: Discussion Summary. 18. Workshop Summary; W. Atluri, D.L. Spooner. Index.
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)