0

Database and Application Security XV

IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18,2001, Niagara on the Lake, Ontario, Canada, IFIP Advances in Information and Communication Technology 87

Erschienen am 12.12.2012, 1. Auflage 2002
106,99 €
(inkl. MwSt.)

Lieferbar innerhalb 1 - 2 Wochen

In den Warenkorb
Bibliografische Daten
ISBN/EAN: 9781475710281
Sprache: Englisch
Umfang: xii, 340 S., 71 s/w Illustr.
Einband: kartoniertes Buch

Beschreibung

InhaltsangabePreface. Part I: Keynote address. Recent Advances in Access Control Models; S. Jajodia, D. Wijesekera. Part II: Role and Constraint-Based Access Control. Role-based Access Control on the Web Using LDAP; J.S. Park, Gail-Joon Ahn, R. Sandhu. Constraints-based Access Control; Wee Yeh Tan. Secure Role-Based Workflow Models; S. Kandala, R. Sandhu. Part III: Distributed Systems. Subject Switching Algorithms for Access Control in Federated Databases; J. Yang, D. Wijesekera, S. Jajodia. Efficient Damage Assessment and Repair in Resilient Distributed Database Systems; Peng Liu, Xu Hao.Administering Permissions for Distributed Data: Factoring and Automated Inference; A. Rosenthal, E. Sciore. State-Dependent Security Decisions for Distributed Object-Systems; J. Biskup, T. Leineweber. Part IV: Information Warfare and Intrusion Detection. Reorganization of Database Log for Information Warfare Data Recovery; R. Sobhan, B. Panda. Randomly Roving Agents For Intrusion Detection; I.S. Moskowitz, Myong H. Kang, Li Wu Chang, G.E. Longdon. Public Telephone Network Vulnerabilities; G. Lorenz, J. Keller, G. Manes, J. Hale, S. Shenoi. Part V: Relational Databases. Flexible Security Policies in SQL; S. Barker, A. Rosenthal. The Inference Problem and Updates in Relational Databases; C. Farkas, T.S. Toland, C.M. Eastman. Managing Classified Documents in a Relational Database; A. Spalka. Part VI: Implementation Issues. A Comparison Between ConSA and Current Linux Security Implementations; A. Hardy, M.S. Olivier. A Novel Approach to Certificate Revocation Management; R. Mukkamala, S. Jajodia. ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications; P. Luenam, Peng Liu. Part VII: Multilevel Systems. An Extended Transaction Model Approach for Multilevel Secure Transaction Processing; V. Atluri, R. Mukkamala. Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System; M. Oliva, F. Saltor. Part VIII: New Application Areas. Security Procedures for Classification Mining Algorithms; T. Johnsten, V.V. Raghavan. Regulating Access to XML documents; A. Gabillon, E. Bruno. Part IX: Panel and discussion. Panel on XML and Security; S. Osborn, B. Thuraisingham, P. Samarati. Selected Summary of Discussions; D.L. Spooner, M.S. Olivier. Index.