Research Advances in Database and Information Systems Security : IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA / edited by Vijay Atluri, John Hale.

Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for th...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Main Author: Atluri, Vijay
Other Authors: Hale, John
Format: eBook
Language:English
Published: Boston, MA : Springer US, 2000.
Series:International Federation for Information Processing (Series) ; 43.
Subjects:

MARC

LEADER 00000cam a2200000Mi 4500
001 b8011950
006 m o d
007 cr |||||||||||
008 130218s2000 mau o 000 0 eng
005 20240418150211.6
020 |a 9780387355085  |q (electronic bk.) 
020 |a 0387355081  |q (electronic bk.) 
020 |z 9781475764116 
020 |z 1475764111 
020 |z 0387355081 
024 7 |a 10.1007/978-0-387-35508-5 
035 |a (OCoLC)spr853255444 
035 |a (OCoLC)853255444 
037 |a spr10.1007/978-0-387-35508-5 
040 |a AU@  |b eng  |e pn  |c AU@  |d OCLCO  |d GW5XE  |d COO  |d UA@  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.9.D35 
100 1 |a Atluri, Vijay. 
245 1 0 |a Research Advances in Database and Information Systems Security :  |b IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA /  |c edited by Vijay Atluri, John Hale. 
260 |a Boston, MA :  |b Springer US,  |c 2000. 
300 |a 1 online resource (xxii, 332 pages) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a IFIP - The International Federation for Information Processing,  |x 1868-4238 ;  |v 43. 
505 0 |a I Intrusion Detection -- 1 Intrusion Confinement by Isolation in Information Systems -- 2 Analyzing the Performance of Program Behavior Profiling for Intrusion Detection -- 3 Integrating Data Mining Techniques with Intrusion Detection Methods -- II Role-Based Access Control -- 4 RBAC on the Web by Secure Cookies -- 5 eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features -- 6 Software Agents for Role Based Security -- III Critical Infrastructure Protection Panel -- 7 Selected Topics in Infrastructure and Information Assurance -- IV Policy/Modeling -- 8 A Secret Splitting Method for Assuring the Confidentiality of Electronic Records -- 9 For Unknown Secrecies Refusal is Better than Lying -- V Workflow Systems -- 10 Extending The BFA Workflow Authorization Model to Express Weighted Voting -- 11 A Strategy for an MLS Workflow Management System -- VI Data Mining/Data Warehousing -- 12 Impact of Decision-Region Based Classification Mining Algorithms on Database Security -- 13 Protecting Against Data Mining through Samples -- 14 Security Administration for Federations, Warehouses, and other Derived Data -- VII Intrusion Detection Panel -- 15 Panel on Intrusion Detection -- VIII Multilevel Security -- 16 Enforcing Integrity While Maintaining Secrecy -- 17 The Effect of Confidentiality on the Structure of Databases -- IX Temporal Authorization Models -- 18 Temporal Authorization in the Simplified Event Calculus -- 19 Specifying and Computing Hierarchies of Temporal Authorizations -- X Object-Oriented Databases -- 20 The Security Problem against Inference Attacks on Object-Oriented Databases -- 21 A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. 
520 |a Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for the whole of society. Research Advances in Database and Information Systems Security covers issues related to security and privacy of information in a wide range of applications, including: Critical Infrastructure Protection; Electronic Commerce; Information Assurance; Intrusion Detection; Workflow; Policy Modeling; Multilevel Security; Role-Based Access Control; Data Mining; Data Warehouses; Temporal Authorization Models; Object-Oriented Databases. This book contains papers and panel discussions from the Thirteenth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 25-28, 1999, in Seattle, Washington, USA. Research Advances in Database and Information Systems Security provides invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners engaged in database security research and development. 
650 0 |a Computer science. 
650 0 |a Data structures (Computer science) 
650 0 |a Information storage and retrieval systems. 
650 0 |a Information Systems. 
650 0 |a Management information systems. 
700 1 |a Hale, John. 
776 0 8 |i Print version:  |z 9781475764116. 
830 0 |a International Federation for Information Processing (Series) ;  |v 43. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-0-387-35508-5  |z Full Text (via Springer) 
907 |a .b80119505  |b 04-21-22  |c 06-02-15 
998 |a web  |b 05-01-17  |c f  |d b   |e -  |f eng  |g mau  |h 0  |i 1 
915 |a M 
956 |a Springer e-books 
956 |b Springer Nature - Springer Book Archive - Springer Computer Science 
956 |a Computer Science 
956 |a Springer e-books: Archive 
999 f f |i 5b985682-06c4-537f-9645-7fd8e1e343cd  |s a1a92f9b-ba24-592d-b272-4b90485051b1 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.D35  |h Library of Congress classification  |i Ebooks, Prospector  |n 1