Preface |
|
vi | |
PART 1 Novel Systems |
|
|
Security issues in data warehousing and data mining: panel discussion |
|
|
3 | (14) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Distributed object technologies, databases and security |
|
|
17 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
PART 2 Distributed and Federated Systems |
|
|
Designing security agents for the DOK federated system |
|
|
35 | (25) |
|
|
|
|
|
Web implementation of a security mediator for medical databases |
|
|
60 | (13) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Supporting the requirements for multilevel secure and real-time databases in distributed environments |
|
|
73 | (22) |
|
|
|
|
|
|
|
|
PART 3 Object-Oriented Systems |
|
|
A Principled approach to object deletion and garbage collection in a multi-level secure object bases |
|
|
95 | (15) |
|
|
|
|
|
|
|
|
|
Compile-time flow analysis of transactions and methods in object-oriented databases |
|
|
110 | (24) |
|
|
|
|
|
|
|
|
|
Capability-based primitives for access control in object-oriented systems |
|
|
134 | (17) |
|
|
|
|
|
|
|
|
|
|
|
|
PART 4 Work flow |
|
|
An execution model for multilevel secure workflows |
|
|
151 | (15) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management |
|
|
166 | (16) |
|
|
|
|
|
|
|
|
|
Alter-egos and roles: supporting workflow security in cyberspaces |
|
|
182 | (17) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
PART 5 Architectures and Systems |
|
|
A Two-tier coarse indexing scheme for MLS database systems |
|
|
199 | (20) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Replication does survive information warfare attacks |
|
|
219 | (10) |
|
|
|
|
|
Priority-driven secure multiversion locking protocol for real-time secure database systems |
|
|
229 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
PART 6 Role-based Access Control |
|
|
Software architectural alternatives for user role-based security policies |
|
|
247 | (15) |
|
|
|
|
|
|
|
|
|
|
|
|
|
The URA97 model for role-based user-role assignment |
|
|
262 | (17) |
|
|
|
|
|
|
|
|
PART 7 Multilevel Security |
|
|
IRI: a quantitative approach to inference analysis in relational databases |
|
|
279 | (12) |
|
|
|
|
|
Structured name-spaces in secure databases |
|
|
291 | (16) |
|
|
|
|
|
|
|
|
|
Multilevel deccision logic: a formalism for rules mining |
|
|
307 | (18) |
|
|
|
|
|
|
|
|
PART 8 Policy Modeling |
|
|
Access controls by object-oriented concepts |
|
|
325 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Administration policies in a multipolicy authorization system |
|
|
341 | (15) |
|
|
|
|
|
|
|
|
|
Datafly: a system for providing anonymity in medical data |
|
|
356 | (29) |
|
|
|
|
PART 9 System Implementations |
|
|
An environment for developing securely interoperable heterogeneous distributed objects |
|
|
385 | (4) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Implementing advanced internet search engines |
|
|
389 | (4) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Index of contributors |
|
393 | (2) |
Keyword index |
|
395 | |