Database Security XII: Status and Prospects
Springer Science & Business Media, Apr 30, 1999 - Business & Economics - 296 pages
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society.
Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including:
This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece.
Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.
What people are saying - Write a review
We haven't found any reviews in the usual places.
ECOMMERCE SECURITY NO SILVER BULLET
TECHNICAL ENFORCEMENT OF INFORMATIONAL ASSURANCES
ANALYZING THE SAFETY OF WORKFLOW AUTHORIZATION MODELS
4 RULES AND PATTERNS FOR SECURITY IN WORKFLOW SYSTEMS
AN INFORMATIONFLOW MODEL FOR PRIVACY INFOPRIV
SACADDOS A SUPPORT TOOL TO MANAGE MULTILEVEL DOCUMENTS
Rolebased Access Controls
USING ROLETEMPLATES FOR HANDLING RECURRING ROLE STRUCTURES
ROLE BASED SECURITY AND JAVA
SECURITY ISSUES IN MOBILE DATABASE ACCESS
BAYESIAN METHODS APPLIED TO THE DATABASE INFERENCE PROBLEM
SECURITY POLICIES IN REPLICATED AND AUTONOMOUS DATABASES
PROGRAMMABLE SECURITY FOR OBJECTORIENTED SYSTEMS
SECURE MEDIATION REQUIREMENTS AND DESIGN
Information Warfare Defense
RECONSTRUCTING THE DATABASE AFTER ELECTRONIC ATTACKS
VERSION MANAGEMENT IN THE STAR MLS DATABASE SYSTEM
Other editions - View all
access control access control lists aglet algorithm applets applications approach attacker attributes authorization constraints authorization model Bayesian Bayesian network classification client Computer Science Computer Security cryptography CTPN damaged data damageJtemJist data item Database Security database systems defined digital signatures Discretionary access control distributed document downgrading dynamic encryption entities environment evaluation example execution Figure freshJist function global graph IEEE IFIP implemented inference rules InfoPriv information flow instance instantiation integration interface Internet issues Java John Smith John Smith's Salary mailing address mechanisms mediator method mobile multilevel security object object-oriented on-page cache operations paper personal data Petri net problem Proc protection protocol return tuples role-based Role-Based Access Control role-hierarchy role-templates roles SACADDOS Sarah Parker schema security policies separation of duties server specific Sushil task technical enforcement template template-roles timestamp transaction update workflow