- Shopping Bag ( 0 items )
Other sellers (Hardcover)
-
All (6) from $2.39
-
New (3) from $110.95
-
Used (3) from $2.39
More About This Textbook
Overview
Research Advances in Database and Information Systems Security covers issues related to security and privacy of information in a wide range of applications, including:
Research Advances in Database and Information Systems Security provides invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners engaged in database security research and development.
Editorial Reviews
Booknews
Computer and information scientists report on recent developments in security and privacy in their field for business and the public sector. The 19 papers and two panel discussions look at detecting intrusion, role-based access control, protecting critical infrastructure, policy ad modeling, workflow systems, data mining and warehousing, multilevel security, temporal authorization models, and object-oriented databases. Among the specific topics are analyzing the performance of program behavior profiling for intrusion detection, a secret splitting method for assuring the confidentiality of electronic records, and the effect of confidentiality on the structure of databases. Annotation c. Book News, Inc., Portland, OR (booknews.com)Product Details
Related Subjects
Meet the Author
Vijay Atluri is an Assistant Professor of Computer Information Systems and Member of the Center for Information Management, Integration and Connectivity in the Management Science and Information Systems Department at Rutgers University, Newark, NJ, USA
John Hale is an Assistant Professor of Computer Science and Director of the Center for Information Security at the University of Tulsa, Tulsa, OK, USA.
Table of Contents
List of Figures. List of Tables. Preface. Contributing Authors. Part I: Intrusion Detection. 1. Intrusion Confinement by Isolation in Information Systems; P. Liu, et al. 2. Analyzing the Performance of Program Behavior Profiling for Intrusion Detection; A.K. Ghosh, A. Schwartzbard. 3. Integrating Data Mining Techniques with Intrusion Detection Methods; R. Mukkamala, et al. Part II: Role-Based Access Control. 4. RBAC on the Web by Secure Cookies; J.S. Park, et al. 5. eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features; I. Mavridis, et al. 6. Software Agents for Role Based Security; S. Demurjian, et al. Part III: Critical Infrastructure Protection Panel. 7. Selected Topics in Infrastructure and Information Assurance; W.V. Maconachu, et al. Part IV: Policy/Modeling. 8. A Secret Splitting Method for Assuring the Confidentiality of Electronic Records; A.P.-J. Ho. 9. For Unknown Secrecies Refusal is Better than Lying; J. Biskup. Part V: Workflow Systems. 10. Extending The BFA Workflow Authorization Model to Express Weighted Voting; S. Kandala, R. Sandhu. 11. A Strategy for an MLS Workflow Management System; M.H. Kang, et al. Part VI: Data Mining/Data Warehousing. 12. Impact of Decision-Region Based Classification Mining Algorithms on Database Security; T. Johnsten, V.V. Raghavan. 13. Protecting Against Data Mining through Samples; C. Clifton. 14. Security Administration for Federations, Warehouses, and other Derived Data; A. Rosenthal, et al. Part VII: Intrusion Detection Panel. 15. Panel on Intrusion Detection; TC Ting, et al. Part VIII: Multilevel Security. 16. Enforcing Integrity While Maintaining Secrecy; D.G. Marks. Part IX: Temporal Authorization Models. 18. Temporal Authorization in the Simplified Event Calculus; S. Barker. 19. Specifying and Computing Hierarchies of Temporal Authorizations; E. Bertino, et al. Part X: Object-Oriented Databases. 20. The Security Problem against Inference Attacks on Object-Oriented Databases; Y. Ishihara, et al. 21. A Logical Formalization for Specifying Authorizations in Object-Oriented Databases; Y. Bai, V. Varadharajan. Index.