Database and Application Security XV : IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada / edited by Martin S. Olivier, David L. Spooner.

Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Main Author: Olivier, Martin S.
Other Authors: Spooner, David L.
Format: eBook
Language:English
Published: Boston, MA : Springer US : Imprint : Springer, 2002.
Series:International Federation for Information Processing (Series) ; 87.
Subjects:

MARC

LEADER 00000cam a2200000Ma 4500
001 b7987438
006 m o d
007 cr |||||||||||
008 121227s2002 mau o 000 0 eng d
005 20240418144629.3
020 |a 9780387355870  |q (electronic bk.) 
020 |a 0387355871  |q (electronic bk.) 
020 |a 9781475710281  |q (print) 
020 |a 1475710283  |q (print) 
020 |z 0387355871 
024 7 |a 10.1007/978-0-387-35587-0 
035 |a (OCoLC)spr840276433 
035 |a (OCoLC)840276433 
037 |a spr10.1007/978-0-387-35587-0 
040 |a I9W  |b eng  |e pn  |c I9W  |d UV0  |d OCLCO  |d GW5XE  |d COO  |d UA@  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.9.D35 
100 1 |a Olivier, Martin S. 
245 1 0 |a Database and Application Security XV :  |b IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15-18, 2001, Niagara on the Lake, Ontario, Canada /  |c edited by Martin S. Olivier, David L. Spooner. 
260 |a Boston, MA :  |b Springer US :  |b Imprint :  |b Springer,  |c 2002. 
300 |a 1 online resource (346 pages) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a IFIP -- The International Federation for Information Processing, 1868-4238 ;  |v 87. 
505 0 |a I Keynote address -- Recent Advances in Access Control Models -- II Role and Constraint-Based Access Control -- Role-based Access Control on the Web Using LDAP -- Constraints-based Access Control -- Secure Role-Based Workflow Models -- III Distributed Systems -- Subject Switching Algorithms for Access Control in Federated Databases -- Efficient Damage Assessment and Repair in Resilient Distributed Database Systems -- Administering Permissions for Distributed Data: Factoring and Automated Inference -- State-Dependent Security Decisions for Distributed Object-Systems -- IV Information Warfare and Intrusion Detection -- Reorganization of Database Log for Information Warfare Data Recovery -- Randomly roving agents for intrusion detection -- Public Telephone Network Vulnerabilities -- V Relational Databases -- Flexible Security Policies in SQL -- The Inference Problem and Updates in Relational Databases -- Managing Classified Documents in a Relational Database -- VI Implementation Issues -- A Comparison Between ConSA and Current Linux Security Implementations -- A Novel Approach to Certificate Revocation Management -- ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications -- VII Multilevel Systems -- An Extended Transaction Model Approach for Multilevel Secure Transaction Processing -- Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System -- VIII New Application Areas -- Security Procedures for Classification Mining Algorithms -- Regulating Access to XML documents -- IX Panel and discussion -- Panel on XML and Security -- Selected Summary of Discussions. 
520 |a Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern in business, industry, government and society. These concerns are compounded by the expanding use of the Internet and wireless communication technologies. This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including: Access control models; Role and constraint-based access control; Distributed systems; Information warfare and intrusion detection; Relational databases; Implementation issues; Multilevel systems; New application areas including XML. Database and Application Security XV contains papers, keynote addresses, and panel discussions from the Fifteenth Annual Working Conference on Database and Application Security, organized by the International Federation for Information Processing (IFIP) Working Group 11.3 and held July 15-18, 2001 in Niagara on the Lake, Ontario, Canada. 
650 0 |a Computer science. 
650 0 |a Data structures (Computer science) 
650 0 |a Information theory. 
650 0 |a Information Systems. 
700 1 |a Spooner, David L. 
776 0 8 |i Printed edition:  |z 9781475710281. 
830 0 |a International Federation for Information Processing (Series) ;  |v 87. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-0-387-35587-0  |z Full Text (via Springer) 
907 |a .b79874381  |b 04-21-22  |c 06-01-15 
998 |a web  |b 05-01-17  |c f  |d b   |e -  |f eng  |g mau  |h 0  |i 1 
915 |a M 
956 |a Springer e-books 
956 |b Springer Nature - Springer Book Archive - Springer Computer Science 
956 |a Computer Science 
956 |a Springer e-books: Archive 
999 f f |i dc607b64-ca94-50bf-9f79-163f81c0927a  |s 28de2d40-0029-5078-85ce-bc909d2e7585 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.D35  |h Library of Congress classification  |i Ebooks, Prospector  |n 1