Database Security XII Status and Prospects

New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implicatio...

Full description

Bibliographic Details
Other Authors: Jajodia, Sushil (Editor)
Format: eBook
Language:English
Published: New York, NY Springer US 1999, 1999
Edition:1st ed. 1999
Series:IFIP Advances in Information and Communication Technology
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 03838nmm a2200409 u 4500
001 EB000615266
003 EBX01000000000000000468348
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9780387355641 
100 1 |a Jajodia, Sushil  |e [editor] 
245 0 0 |a Database Security XII  |h Elektronische Ressource  |b Status and Prospects  |c edited by Sushil Jajodia 
250 |a 1st ed. 1999 
260 |a New York, NY  |b Springer US  |c 1999, 1999 
300 |a XX, 296 p  |b online resource 
505 0 |a I Invited Talks -- 1 E-Commerce Security: No Silver Bullet -- 2 Technical Enforcement of Informational Assurances -- II Workflow -- 3 Analyzing the Safety of Workflow Authorization Models -- 4 Rules and Patterns for Security in Workflow Systems -- III Privacy -- 5 An information-flow model for Privacy (InfoPriv) -- IV Policy Modeling -- 6 Security Policies in Replicated and Autonomous Databases -- 7 Programmable Security for Object-Oriented Systems -- V Mediation -- 8 Secure Mediation: Requirements and Design -- VI Information Warfare Defense -- 9 Reconstructing the Database after Electronic Attacks -- VII Multilevel Security -- 10 Version Management in the STAR MLS Database System -- 11 SACADDOS: a support tool to manage multilevel documents -- VIII Role-based Access Controls -- 12 Using Role-Templates for Handling Recurring Role Structures -- 13 Role Based Security and Java -- IX Mobile Databases -- 14 Security Issues in Mobile Database Access -- X Inference -- 15 Bayesian Methods Applied to the Database Inference Problem -- 16 The Design and Implementation of a Data Level Database Inference Detection System -- XI Pane -- 17 Security and Privacy Issues for the World Wide Web: Panel Discussion -- XII Discussion Summary -- 18 Workshop Summary 
653 |a Computer science 
653 |a Information Storage and Retrieval 
653 |a Electronic data processing / Management 
653 |a Data Structures and Information Theory 
653 |a Application software 
653 |a Information storage and retrieval systems 
653 |a IT in Business 
653 |a Information theory 
653 |a Data structures (Computer science) 
653 |a Computer and Information Systems Applications 
653 |a Theory of Computation 
653 |a Business information services 
653 |a IT Operations 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a IFIP Advances in Information and Communication Technology 
028 5 0 |a 10.1007/978-0-387-35564-1 
856 4 0 |u https://doi.org/10.1007/978-0-387-35564-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.0151 
520 |a New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce Informational Assurances Workflow Privacy Policy Modeling Mediation Information Warfare Defense Multilevel Security Role-based Access Controls Mobile Databases Inference Data Warehouses and Data Mining. This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece. Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development