Data and Application Security: Developments and Directions

Author:   B. Thuraisingham ,  Reind van de Riet ,  Klaus R. Dittrich ,  Zahir Tari
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2002
Volume:   73
ISBN:  

9781475775020


Pages:   378
Publication Date:   30 May 2013
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $630.96 Quantity:  
Add to Cart

Share |

Data and Application Security: Developments and Directions


Add your own review!

Overview

Full Product Details

Author:   B. Thuraisingham ,  Reind van de Riet ,  Klaus R. Dittrich ,  Zahir Tari
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2002
Volume:   73
Dimensions:   Width: 15.50cm , Height: 2.10cm , Length: 23.50cm
Weight:   0.599kg
ISBN:  

9781475775020


ISBN 10:   1475775024
Pages:   378
Publication Date:   30 May 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Protecting Information when Access is Granted for Collaboration.- Author-?: A Java-Based System For XML Data Protection.- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution.- XML Access Control Systems: A Component-Based Approach.- A Configurable Security Architecture Prototype.- Distributed Policies for Data Management — Making Policies Mobile.- Security Architecture of The Multimedia Mediator.- Simulation And Analysis of Cryptographic Protocols.- Authentic Third-Party Data Publication.- Protecting File Systems Against Corruption Using Checksums.- Web Security and Privacy.- Coordinating Policy for Federated Applications.- Integrating Multilevel Security Policies in Multilevel Federated Database Systems.- Wrappers – A Mechanism to Support State-Based Authorization in Web Applications.- An Integrated Framework for Database Privacy Protection.- Discovery of Multi-Level Security Policies.- Protecting Deductive Databases from Unauthorized Retrievals.- Confidentiality vs Integrity in Secure Databases.- Extending SQL’s Grant Operation to Limit Privileges.- Language Extensions for Programmable Security.- Protecting Privacy from Continuous High-Resolution Satellite Surveillance.- Database Security Integration Using Role-Based Access Control.- User Role-Based Security Model for a Distributed Environment.- WorkFlow Analyzed for Security and Privacy in using Databases.- Identifying Security Holes in OLAP Applications.- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations.- Database Security 2000.- Declarative Semantics of Belief Queries in Mls Deductive Databases.- Trust Management in Distributed Databases.- Active Authorization as High-level Control.- Conference Key Agreement Protocol usingOblivious Transfer.- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task.- Authorization Model in Object-Oriented Systems.- Panel 2.- Conference Summary.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

RGJUNE2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List