Buch, Englisch, Band 14, 296 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 487 g
Reihe: IFIP Advances in Information and Communication Technology
Status and Prospects
Buch, Englisch, Band 14, 296 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 487 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-1-4757-4914-4
Verlag: Springer US
Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: - Electronic Commerce
- Informational Assurances
- Workflow
- Privacy
- Policy Modeling
- Mediation
- Information Warfare Defense
- Multilevel Security
- Role-based Access Controls
- Mobile Databases
- Inference
- Data Warehouses and Data Mining.
This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece.
Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Information Retrieval
- Mathematik | Informatik EDV | Informatik Professionelle Anwendung
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Warehouse
- Mathematik | Informatik EDV | Informatik Informatik Mathematik für Informatiker
- Mathematik | Informatik EDV | Informatik Angewandte Informatik
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsmathematik und -statistik
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
Weitere Infos & Material
I Invited Talks.- 1 E-Commerce Security: No Silver Bullet.- 2 Technical Enforcement of Informational Assurances.- II Workflow.- 3 Analyzing the Safety of Workflow Authorization Models.- 4 Rules and Patterns for Security in Workflow Systems.- III Privacy.- 5 An information-flow model for Privacy (InfoPriv).- IV Policy Modeling.- 6 Security Policies in Replicated and Autonomous Databases.- 7 Programmable Security for Object-Oriented Systems.- V Mediation.- 8 Secure Mediation: Requirements and Design.- VI Information Warfare Defense.- 9 Reconstructing the Database after Electronic Attacks.- VII Multilevel Security.- 10 Version Management in the STAR MLS Database System.- 11 SACADDOS: a support tool to manage multilevel documents.- VIII Role-based Access Controls.- 12 Using Role-Templates for Handling Recurring Role Structures.- 13 Role Based Security and Java.- IX Mobile Databases.- 14 Security Issues in Mobile Database Access.- X Inference.- 15 Bayesian Methods Applied to the Database Inference Problem.- 16 The Design and Implementation of a Data Level Database Inference Detection System.- XI Pane.- 17 Security and Privacy Issues for the World Wide Web: Panel Discussion.- XII Discussion Summary.- 18 Workshop Summary.