|
![]() |
|||
|
||||
OverviewNew technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. This volume covers issues related to security and privacy of information in a wide range of applications, including electronic commerce, informational assurances, workflow, privacy, policy modelling, mediation, information warfare defence, multilevel security, role-based access controls, mobile databases, inference, data warehouses and data mining. Full Product DetailsAuthor: Sushil JajodiaPublisher: Springer Imprint: Springer Edition: 1999 ed. Volume: 14 Dimensions: Width: 15.50cm , Height: 1.90cm , Length: 23.50cm Weight: 1.390kg ISBN: 9780792384885ISBN 10: 0792384881 Pages: 296 Publication Date: 30 April 1999 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsI Invited Talks.- 1 E-Commerce Security: No Silver Bullet.- 2 Technical Enforcement of Informational Assurances.- II Workflow.- 3 Analyzing the Safety of Workflow Authorization Models.- 4 Rules and Patterns for Security in Workflow Systems.- III Privacy.- 5 An information-flow model for Privacy (InfoPriv).- IV Policy Modeling.- 6 Security Policies in Replicated and Autonomous Databases.- 7 Programmable Security for Object-Oriented Systems.- V Mediation.- 8 Secure Mediation: Requirements and Design.- VI Information Warfare Defense.- 9 Reconstructing the Database after Electronic Attacks.- VII Multilevel Security.- 10 Version Management in the STAR MLS Database System.- 11 SACADDOS: a support tool to manage multilevel documents.- VIII Role-based Access Controls.- 12 Using Role-Templates for Handling Recurring Role Structures.- 13 Role Based Security and Java.- IX Mobile Databases.- 14 Security Issues in Mobile Database Access.- X Inference.- 15 Bayesian Methods Applied to the Database Inference Problem.- 16 The Design and Implementation of a Data Level Database Inference Detection System.- XI Pane.- 17 Security and Privacy Issues for the World Wide Web: Panel Discussion.- XII Discussion Summary.- 18 Workshop Summary.ReviewsAuthor InformationDr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA Tab Content 6Author Website:Countries AvailableAll regions |