|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: B. Thuraisingham , Reind van de Riet , Klaus R. Dittrich , Zahir TariPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: Softcover reprint of the original 1st ed. 2002 Volume: 73 Dimensions: Width: 15.50cm , Height: 2.10cm , Length: 23.50cm Weight: 0.599kg ISBN: 9781475775020ISBN 10: 1475775024 Pages: 378 Publication Date: 30 May 2013 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsProtecting Information when Access is Granted for Collaboration.- Author-?: A Java-Based System For XML Data Protection.- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution.- XML Access Control Systems: A Component-Based Approach.- A Configurable Security Architecture Prototype.- Distributed Policies for Data Management — Making Policies Mobile.- Security Architecture of The Multimedia Mediator.- Simulation And Analysis of Cryptographic Protocols.- Authentic Third-Party Data Publication.- Protecting File Systems Against Corruption Using Checksums.- Web Security and Privacy.- Coordinating Policy for Federated Applications.- Integrating Multilevel Security Policies in Multilevel Federated Database Systems.- Wrappers – A Mechanism to Support State-Based Authorization in Web Applications.- An Integrated Framework for Database Privacy Protection.- Discovery of Multi-Level Security Policies.- Protecting Deductive Databases from Unauthorized Retrievals.- Confidentiality vs Integrity in Secure Databases.- Extending SQL’s Grant Operation to Limit Privileges.- Language Extensions for Programmable Security.- Protecting Privacy from Continuous High-Resolution Satellite Surveillance.- Database Security Integration Using Role-Based Access Control.- User Role-Based Security Model for a Distributed Environment.- WorkFlow Analyzed for Security and Privacy in using Databases.- Identifying Security Holes in OLAP Applications.- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations.- Database Security 2000.- Declarative Semantics of Belief Queries in Mls Deductive Databases.- Trust Management in Distributed Databases.- Active Authorization as High-level Control.- Conference Key Agreement Protocol usingOblivious Transfer.- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task.- Authorization Model in Object-Oriented Systems.- Panel 2.- Conference Summary.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |