Gertz / Jajodia | Handbook of Database Security | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 577 Seiten

Reihe: Computer Science (R0)

Gertz / Jajodia Handbook of Database Security

Applications and Trends
1. Auflage 2007
ISBN: 978-0-387-48533-1
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark

Applications and Trends

E-Book, Englisch, 577 Seiten

Reihe: Computer Science (R0)

ISBN: 978-0-387-48533-1
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark



Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.

Gertz / Jajodia Handbook of Database Security jetzt bestellen!

Weitere Infos & Material


1;Contents;8
2;List of Contributors;10
3;1 Recent Advances in Access Control;14
3.1;1 Introduction;14
3.2;2 Classical Access Control Models;16
3.3;3 Credential-Based Access Control;22
3.4;4 Policy Composition;26
3.5;5 Access Control Through Encryption;30
3.6;6 Conclusions;35
3.7;Acknowledgements;35
3.8;References;36
4;2 Access Control Models for XML;40
4.1;1 Introduction;40
4.2;2 Preliminary Concepts;41
4.3;3 XML Access Control Requirements;46
4.4;4 XML Access Control Models;50
4.5;5 Conclusions;63
4.6;References;64
5;3 Access Control Policy Languages in XML;67
5.1;1 Introduction;67
5.2;2 Policy Specification Languages;68
5.3;3 Example XML Document and Associated Policy;68
5.4;4 XML Access Control Policy Languages;70
5.5;5 Policy Modeling and Generation;78
5.6;6 Conclusions;81
5.7;References;82
6;4 Database Issues in Trust Management and Trust Negotiation;84
6.1;1 Introduction to Trust Management;84
6.2;2 What is Trust Management?;86
6.3;3 History;91
6.4;4 Evaluation Problems and Strategies;100
6.5;5 Automated Trust Negotiation;110
6.6;6 Open Issues and Trends;118
6.7;References;120
7;5 Authenticated Index Structures for Outsourced Databases;125
7.1;1 Introduction;125
7.2;2 Cryptographic Background;126
7.3;3 Authenticated Index Structures for Selection Queries;129
7.4;4 Authentication Index Structures in Dynamic Settings;140
7.5;5 Query Freshness;143
7.6;6 Extensions;143
7.7;7 Conclusion;144
7.8;References;145
8;6 Towards Secure Data Outsourcing;147
8.1;1 Introduction;148
8.2;2 Designing Secure Data Outsourcing Mechanisms.;150
8.3;3 Related Work.;162
8.4;4 Acknowledgments;164
8.5;References;164
9;7 Managing and Querying Encrypted Data;172
9.1;1 Introduction;172
9.2;2 DAS - Storing & Querying Encrypted Data;173
9.3;3 Trust, Encryption, Key-management, Integrity & Data Confidentiality;191
9.4;4 Summary & Related Work;195
9.5;5 Acknowledgements;197
9.6;References;197
10;8 Security in Data Warehouses and OLAP Systems;200
10.1;1 Introduction;200
10.2;2 Background;202
10.3;3 Security Requirements;206
10.4;4 A Three-Tier Security Architecture;208
10.5;5 Securing OLAP Data Cubes;210
10.6;6 Conclusion;219
10.7;References;219
11;9 Security for Workflow Systems;222
11.1;1 Introduction;222
11.2;2 Security Requirements in Workflow Systems;224
11.3;3 Workflow Authorization Model;225
11.4;4 Separation of Duty;226
11.5;5 Delegation of Authority;232
11.6;6 Conflict-of-Interest;234
11.7;7 Workflow Safety Analysis;236
11.8;8 Open Issues;236
11.9;References;238
12;10 Secure Semantic Web Services;240
12.1;1 Introduction;240
12.2;2 Web Services Security;241
12.3;3 Security and the Semantic Web;245
12.4;4 Integrating Security, Semantic Web and Web Services Technologies;251
12.5;5 Summary and Directions;252
12.6;References;253
13;11 Geospatial Database Security;255
13.1;1 Introduction;255
13.2;2 Geospatial Data Models;257
13.3;3 Geospatial Access Control Models;259
13.4;4 Conclusion and Future Directions;272
13.5;References;273
14;12 Security Re-engineering for Databases: Concepts and Techniques;275
14.1;1 Introduction;275
14.2;2 Insider Misuse and Anomaly Detection;278
14.3;3 Data and User Profiling;280
14.4;4 Access Path Model;289
14.5;5 Security Reconfiguration;295
14.6;6 Related Work;298
14.7;7 Conclusions and Future Directions;299
14.8;References;300
15;13 Database Watermarking for Copyright Protection;305
15.1;1 Introduction;305
15.2;2 Model;306
15.3;3 Numeric Types;315
15.4;4 Categorical Types;325
15.5;5 Related Work;331
15.6;6 State of The Art and the Future;333
15.7;7 Conclusions;334
15.8;8 Acknowledgments;334
15.9;References;334
16;14 Database Watermarking: A Systematic View;337
16.1;1 Introduction;337
16.2;2 Data Type;339
16.3;3 Distortion;341
16.4;4 Sensitivity;345
16.5;5 Watermark Information;349
16.6;6 Verifiability;355
16.7;7 Data Structure;358
16.8;8 Open Issues;362
16.9;References;362
17;15 Trustworthy Records Retention;364
17.1;1 Introduction;364
17.2;2 Problem Definition;365
17.3;3 Usage Scenario and Threat Model;367
17.4;4 Storage Architectures;369
17.5;5 Resistance to Physical Attack;373
17.6;6 Trustworthy Indexing;375
17.7;7 Trustworthy Migration;380
17.8;8 Trustworthy Deletion;382
17.9;9 Open Problems;385
17.10;Acknowledgements;385
17.11;References;386
18;16 Damage Quarantine and Recovery in Data Processing Systems;389
18.1;1 Introduction;389
18.2;2 Overview of the DQR Problem;390
18.3;3 Traditional Failure Recovery Techniques and Their Limitations;394
18.4;4 Solving the DQR Problem;397
18.5;5 Remaining Research Issues and Concluding Remarks;408
18.6;Acknowledgement;409
18.7;References;410
19;17 Hippocratic Databases: Current Capabilities and Future Trends;414
19.1;1 Introduction;414
19.2;2 Founding Principles of a Hippocratic Database;415
19.3;3 Hippocratic Database Technologies;416
19.4;4 Future Work;428
19.5;5 Conclusion;432
19.6;References;432
20;18 Privacy-Preserving Data Mining: A Survey;435
20.1;1 Introduction;435
20.2;2 The Randomization Method;437
20.3;3 The k-Anonymity Framework;443
20.4;4 Distributed Privacy-Preserving Data Mining;449
20.5;5 Privacy-Preservation of Application Results;453
20.6;6 Limitations of Privacy: The Curse of Dimensionality;457
20.7;7 Summary;459
20.8;References;459
21;19 Privacy in Database Publishing: A Bayesian Perspective;465
21.1;1 Introduction;465
21.2;2 GBP: A Generic Bayesian Privacy Model;466
21.3;3 View-Based Publishing;474
21.4;4 Generalization-Based Publishing;478
21.5;5 View-Based Versus Generalization-Based Publishing;487
21.6;6 Privacy in Open-World Integration;488
21.7;7 Conclusions;489
21.8;References;489
22;20 Privacy Preserving Publication: Anonymization Frameworks and Principles;492
22.1;1 Introduction;492
22.2;2 k-anonymous Generalization;494
22.3;3 l-diverse Generalization;497
22.4;4 Anatomy;499
22.5;5 Summary;509
22.6;References;510
23;21 Privacy Protection through Anonymity in Location-based Services;512
23.1;1 Introduction;512
23.2;2 Privacy threats with LBS;513
23.3;3 Privacy protection through anonymity;518
23.4;4 Techniques to enforce anonymity;521
23.5;5 Experimental results;527
23.6;6 Conclusion;531
23.7;References;532
24;22 Privacy-enhanced Location-based Access Control;534
24.1;1 Introduction;534
24.2;2 Location-based Access Control Systems;535
24.3;3 Location Privacy;539
24.4;4 Obfuscation Techniques for Location Privacy Protection;544
24.5;5 Integrating Obfuscation Techniques with LBAC Systems;549
24.6;6 Conclusions;552
24.7;Acknowledgments;552
24.8;References;553
25;23 Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment;556
25.1;1 Introduction;556
25.2;2 System Architecture for a Mobile Application Environment;559
25.3;3 Authorization Model in a Mobile Environment;561
25.4;4 Unified Index for Authorizations and Profiles;562
25.5;5 Unified Index for Authorizations and Moving Objects;564
25.6;6 Unified Index for Authorizations, Moving Objects and Profiles;570
25.7;7 Open Issues;575
25.8;References;575



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.