|
![]() |
|||
|
||||
OverviewDatabase security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations. Instead, allowing selective access from different security domains has become a must for many business practices. Many of the assumptions and problems in traditional databases need to be revisited and readdressed in decentralized en- ronments. Further, the Internet and the Web offer means for collecting and sharing data with unprecedented flexibility and convenience. New data services are eme- ing every day, which also bring new challenges to protect of data security. We have witnessed many exciting research works toward identifying and addressing such new challenges. We feel it is necessary to summarize and systematically present works in these new areas to researchers. This book presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. Full Product DetailsAuthor: Ting Yu , Sushil JajodiaPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2007 ed. Volume: 33 Dimensions: Width: 15.50cm , Height: 2.60cm , Length: 23.50cm Weight: 1.850kg ISBN: 9780387276946ISBN 10: 0387276947 Pages: 462 Publication Date: 11 December 2006 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsFoundation.- Basic Security Concepts.- Access Control Policies and Languages in Open Environments.- Trusted Recovery.- Access Control for Semi-Structured Data.- Access Control Policy Models for XML.- Optimizing Tree Pattern Queries over Secure XML Databases.- Distributed Trust Management.- Rule-based Policy Specification.- Automated Trust Negotiation in Open Systems.- Building Trust and Security in Peer-to-Peer Systems.- Privacy in Cross-Domain Information Sharing.- Microdata Protection.- ?-Anonymity.- Preserving Privacy in On-line Analytical Processing Data Cubes.- Security in Emerging Data Services.- Search on Encrypted Data.- Rights Assessment for Relational Data.Reviews"From the reviews: ""Secure data management in decentralized systems is addressed in this book. … This book should appeal to researchers and graduate students who want to acquire in-depth knowledge of information security and its extension to distributed database systems. After reading the book closely, one will have a better understanding of the new set of issues and the complexity of securing distributed data in emerging environments."" (Jean-Pierre Kuilboer, ACM Computing Reviews, Vol. 49 (4), April, 2008)" From the reviews: Secure data management in decentralized systems is addressed in this book. ... This book should appeal to researchers and graduate students who want to acquire in-depth knowledge of information security and its extension to distributed database systems. After reading the book closely, one will have a better understanding of the new set of issues and the complexity of securing distributed data in emerging environments. (Jean-Pierre Kuilboer, ACM Computing Reviews, Vol. 49 (4), April, 2008) From the reviews: Secure data management in decentralized systems is addressed in this book. ! This book should appeal to researchers and graduate students who want to acquire in-depth knowledge of information security and its extension to distributed database systems. After reading the book closely, one will have a better understanding of the new set of issues and the complexity of securing distributed data in emerging environments. (Jean-Pierre Kuilboer, ACM Computing Reviews, Vol. 49 (4), April, 2008) Author InformationTab Content 6Author Website:Countries AvailableAll regions |