Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, CanadaMartin S. Olivier, David L. Spooner Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern in business, industry, government and society. These concerns are compounded by the expanding use of the Internet and wireless communication technologies. This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:
Database and Application Security XV contains papers, keynote addresses, and panel discussions from the Fifteenth Annual Working Conference on Database and Application Security, organized by the International Federation for Information Processing (IFIP) Working Group 11.3 and held July 15-18, 2001 in Niagara on the Lake, Ontario, Canada. |
Contents
RECENT ADVANCES IN ACCESS CONTROL MODELS | 7 |
II | 21 |
ROLEBASED ACCESS CONTROL ON THE WEB USING LDAP | 23 |
CONSTRAINTSBASED ACCESS CONTROL | 35 |
SECURE ROLEBASED WORKFLOW MODELS | 49 |
IV | 63 |
SUBJECT SWITCHING ALGORITHMS FOR ACCESS CONTROL IN FEDERATED DATABASES | 65 |
EFFICIENT DAMAGE ASSESSMENT AND REPAIR 1N RESILIENT DISTRIBUTED DATABASE SYSTEMS | 79 |
MANAGING CLASSIFIED DOCUMENTS IN A RELATIONAL DATABASE | 199 |
VI | 213 |
A COMPARISON BETWEEN ConSA AND CURRENT LINUX SECURITY IMPLEMENTATIONS | 215 |
A NOVEL APPROACH TO CERTIFICATE REVOCATION MANAGEMENT | 229 |
AN ONTHEFLY DAMAGE ASSESSMENT AND REPAIR SYSTEM FOR COMMERCIAL DATABASE APPLICATIONS | 243 |
VIII | 257 |
AN EXTENDED TRANSACTION MODEL APPROACH FOR MULTILEVEL SECURE TRANSACTION PROCESSING | 259 |
MAINTAINING THE CONFIDENTIALITY OF INTEROPERABLE DATABASES WITH A MULTILEVEL FEDERATED SECURITY SYSTEM | 273 |
Factoring and Automated Inference | 95 |
STATEDEPENDENT SECURITY DECISIONS FOR DISTRIBUTED OBJECTSYSTEMS | 109 |
REORGANIZATION OF THE DATABASE LOG FOR INFORMATION WARFARE DATA RECOVERY | 125 |
RANDOMLY ROVING AGENTS FOR INTRUSION DETECTION | 139 |
PUBLIC TELEPHONE NETWORK VULNERABILITIES | 155 |
V | 169 |
FLEXIBLE SECURITY POLICIES IN SQL | 171 |
THE INFERENCE PROBLEM AND UPDATES IN RELATIONAL DATABASES | 185 |
IX | 287 |
SECURITY PROCEDURES FOR CLASSIFICATION MINING ALGORITHMS | 289 |
REGULATING ACCESS TO XML DOCUMENTS | 303 |
X | 319 |
PANEL ON XML AND SECURITY | 321 |
SELECTED SUMMARY OF DISCUSSIONS | 329 |
Other editions - View all
Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual ... Martin S. Olivier,David L. Spooner No preview available - 2012 |


