Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

Front Cover
Martin S. Olivier, David L. Spooner
Springer Science & Business Media, Apr 30, 2002 - Computers - 335 pages

Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern in business, industry, government and society. These concerns are compounded by the expanding use of the Internet and wireless communication technologies.

This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:

  • Access control models;
  • Role and constraint-based access control;
  • Distributed systems;
  • Information warfare and intrusion detection;
  • Relational databases;
  • Implementation issues;
  • Multilevel systems;
  • New application areas including XML.

Database and Application Security XV contains papers, keynote addresses, and panel discussions from the Fifteenth Annual Working Conference on Database and Application Security, organized by the International Federation for Information Processing (IFIP) Working Group 11.3 and held July 15-18, 2001 in Niagara on the Lake, Ontario, Canada.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

RECENT ADVANCES IN ACCESS CONTROL MODELS
3
II
17
ROLEBASED ACCESS CONTROL ON THE WEB USING LDAP
19
CONSTRAINTSBASED ACCESS CONTROL
31
SECURE ROLEBASED WORKFLOW MODELS
45
III
59
SUBJECT SWITCHING ALGORITHMS FOR ACCESS CONTROL IN FEDERATED DATABASES
61
EFFICIENT DAMAGE ASSESSMENT AND REPAIR 1N RESILIENT DISTRIBUTED DATABASE SYSTEMS
75
MANAGING CLASSIFIED DOCUMENTS IN A RELATIONAL DATABASE
195
V
209
A COMPARISON BETWEEN ConSA AND CURRENT LINUX SECURITY IMPLEMENTATIONS
211
A NOVEL APPROACH TO CERTIFICATE REVOCATION MANAGEMENT
225
AN ONTHEFLY DAMAGE ASSESSMENT AND REPAIR SYSTEM FOR COMMERCIAL DATABASE APPLICATIONS
239
VI
253
AN EXTENDED TRANSACTION MODEL APPROACH FOR MULTILEVEL SECURE TRANSACTION PROCESSING
255
MAINTAINING THE CONFIDENTIALITY OF INTEROPERABLE DATABASES WITH A MULTILEVEL FEDERATED SECURITY SYSTEM
269

Factoring and Automated Inference
91
STATEDEPENDENT SECURITY DECISIONS FOR DISTRIBUTED OBJECTSYSTEMS
105
REORGANIZATION OF THE DATABASE LOG FOR INFORMATION WARFARE DATA RECOVERY
121
RANDOMLY ROVING AGENTS FOR INTRUSION DETECTION
135
PUBLIC TELEPHONE NETWORK VULNERABILITIES
151
IV
165
FLEXIBLE SECURITY POLICIES IN SQL
167
THE INFERENCE PROBLEM AND UPDATES IN RELATIONAL DATABASES
181
VII
283
SECURITY PROCEDURES FOR CLASSIFICATION MINING ALGORITHMS
285
REGULATING ACCESS TO XML DOCUMENTS
299
VIII
315
PANEL ON XML AND SECURITY
317
SELECTED SUMMARY OF DISCUSSIONS
325
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information