Warenkorb
€ 0,00 0 Buch dabei,
portofrei
Research Advances in Database and Information Systems Security als Buch
PORTO-
FREI

Research Advances in Database and Information Systems Security

IFIP TC11 WG11. 3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA.…
Buch (gebunden)
Ihr 12%-Rabatt auf alle Spielwaren, Hörbücher, Filme, Musik u.v.m
 
12% Rabatt sichern mit Gutscheincode: SONNE12
 
Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in business … weiterlesen
Buch

139,99*

inkl. MwSt.
Portofrei
Lieferbar innerhalb von zwei bis drei Werktagen
Research Advances in Database and Information Systems Security als Buch

Produktdetails

Titel: Research Advances in Database and Information Systems Security

ISBN: 0792378482
EAN: 9780792378488
IFIP TC11 WG11. 3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA.
'International Federation for Information Processing (IFIP)'.
2000. Auflage.
Book.
Sprache: Englisch.
Herausgegeben von Vijay Atluri, John Hale
Springer US

31. Mai 2000 - gebunden - 360 Seiten

Beschreibung

Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for the whole of society.
Research Advances in Database and Information Systems Security covers issues related to security and privacy of information in a wide range of applications, including: Critical Infrastructure Protection;
Electronic Commerce;
Information Assurance;
Intrusion Detection;
Workflow;
Policy Modeling;
Multilevel Security;
Role-Based Access Control;
Data Mining;
Data Warehouses;
Temporal Authorization Models;
Object-Oriented Databases.

This book contains papers and panel discussions from the Thirteenth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 25-28, 1999, in Seattle, Washington, USA.
Research Advances in Database and Information Systems Security provides invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners engaged in database security research and development.

Inhaltsverzeichnis

List of Figures. List of Tables. Preface. Contributing Authors. Part I: Intrusion Detection. 1. Intrusion Confinement by Isolation in Information Systems; P. Liu, et al. 2. Analyzing the Performance of Program Behavior Profiling for Intrusion Detection; A.K. Ghosh, A. Schwartzbard. 3. Integrating Data Mining Techniques with Intrusion Detection Methods; R. Mukkamala, et al. Part II: Role-Based Access Control. 4. RBAC on the Web by Secure Cookies; J.S. Park, et al. 5. eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features; I. Mavridis, et al. 6. Software Agents for Role Based Security; S. Demurjian, et al. Part III: Critical Infrastructure Protection Panel. 7. Selected Topics in Infrastructure and Information Assurance; W.V. Maconachu, et al. Part IV: Policy/Modeling. 8. A Secret Splitting Method for Assuring the Confidentiality of Electronic Records; A.P.-J. Ho. 9. For Unknown Secrecies Refusal is Better than Lying; J. Biskup. Part V: Workflow Systems. 10. Extending The BFA Workflow Authorization Model to Express Weighted Voting; S. Kandala, R. Sandhu. 11. A Strategy for an MLS Workflow Management System; M.H. Kang, et al. Part VI: Data Mining/Data Warehousing. 12. Impact of Decision-Region Based Classification Mining Algorithms on Database Security; T. Johnsten, V.V. Raghavan. 13. Protecting Against Data Mining through Samples; C. Clifton. 14. Security Administration for Federations, Warehouses, and other Derived Data; A. Rosenthal, et al. Part VII: Intrusion Detection Panel. 15. Panel on Intrusion Detection; TC Ting, et al. Part VIII: Multilevel Security. 16. Enforcing Integrity While Maintaining Secrecy; D.G. Marks. Part IX: Temporal Authorization Models. 18. Temporal Authorization in the Simplified Event Calculus; S. Barker. 19. Specifying and Computing Hierarchies of Temporal Authorizations; E. Bertino, et al. Part X: Object-Oriented Databases. 20. The Security Problem against Inference Attacks on Object-Oriented Databases; Y. Ishihara, et al. 21. A Logical Formalization for Specifying Authorizations in Object-Oriented Databases; Y. Bai, V. Varadharajan. Index.

Portrait

Vijay Atluri is an Assistant Professor of Computer Information Systems and Member of the Center for Information Management, Integration and Connectivity in the Management Science and Information Systems Department at Rutgers University, Newark, NJ, USA
John Hale is an Assistant Professor of Computer Science and Director of the Center for Information Security at the University of Tulsa, Tulsa, OK, USA.
Servicehotline
089 - 70 80 99 47

Mo. - Fr. 8.00 - 20.00 Uhr
Sa. 10.00 - 20.00 Uhr
Filialhotline
089 - 30 75 75 75

Mo. - Sa. 9.00 - 20.00 Uhr
Bleiben Sie in Kontakt:
Sicher & bequem bezahlen:
akzeptierte Zahlungsarten: Überweisung, offene Rechnung,
Visa, Master Card, American Express, Paypal
Zustellung durch:
* Alle Preise verstehen sich inkl. der gesetzlichen MwSt. Informationen über den Versand und anfallende Versandkosten finden Sie hier.
** Deutschsprachige eBooks und Bücher dürfen aufgrund der in Deutschland geltenden Buchpreisbindung und/oder Vorgaben von Verlagen nicht rabattiert werden. Soweit von uns deutschsprachige eBooks und Bücher günstiger angezeigt werden, wurde bei diesen kürzlich von den Verlagen der Preis gesenkt oder die Buchpreisbindung wurde für diese Titel inzwischen aufgehoben. Angaben zu Preisnachlässen beziehen sich auf den dargestellten Vergleichspreis.