Buch, Englisch, Band 43, 334 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 1510 g
Reihe: IFIP Advances in Information and Communication Technology
IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA
Buch, Englisch, Band 43, 334 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 1510 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-0-7923-7848-8
Verlag: Springer US
covers issues related to security and privacy of information in a wide range of applications, including:
- Critical Infrastructure Protection;
- Electronic Commerce;
- Information Assurance;
- Intrusion Detection;
- Workflow;
- Policy Modeling;
- Multilevel Security;
- Role-Based Access Control;
- Data Mining;
- Data Warehouses;
- Temporal Authorization Models;
- Object-Oriented Databases.
provides invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners engaged in database security research and development.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Business Application Unternehmenssoftware SAP
Weitere Infos & Material
I Intrusion Detection.- 1 Intrusion Confinement by Isolation in Information Systems.- 2 Analyzing the Performance of Program Behavior Profiling for Intrusion Detection.- 3 Integrating Data Mining Techniques with Intrusion Detection Methods.- II Role-Based Access Control.- 4 RBAC on the Web by Secure Cookies.- 5 eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features.- 6 Software Agents for Role Based Security.- III Critical Infrastructure Protection Panel.- 7 Selected Topics in Infrastructure and Information Assurance.- IV Policy/Modeling.- 8 A Secret Splitting Method for Assuring the Confidentiality of Electronic Records.- 9 For Unknown Secrecies Refusal is Better than Lying.- V Workflow Systems.- 10 Extending The BFA Workflow Authorization Model to Express Weighted Voting.- 11 A Strategy for an MLS Workflow Management System.- VI Data Mining/Data Warehousing.- 12 Impact of Decision-Region Based Classification Mining Algorithms on Database Security.- 13 Protecting Against Data Mining through Samples.- 14 Security Administration for Federations, Warehouses, and other Derived Data.- VII Intrusion Detection Panel.- 15 Panel on Intrusion Detection.- VIII Multilevel Security.- 16 Enforcing Integrity While Maintaining Secrecy.- 17 The Effect of Confidentiality on the Structure of Databases.- IX Temporal Authorization Models.- 18 Temporal Authorization in the Simplified Event Calculus.- 19 Specifying and Computing Hierarchies of Temporal Authorizations.- X Object-Oriented Databases.- 20 The Security Problem against Inference Attacks on Object-Oriented Databases.- 21 A Logical Formalization for Specifying Authorizations in Object-Oriented Databases.