List Price: $224.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students with a broad perspective of recent developments in what is recognised as a key topic in business and in the public sector.

Table of Contents

Preface vi
PART 1 Novel Systems
Security issues in data warehousing and data mining: panel discussion
3(14)
B. Thuraisingham
L. Schlipper
P. Samarati
T.Y. Lin
S. Jajodia
C. Clifton
Distributed object technologies, databases and security
17(18)
C.D. McCollum
D.B. Faatz
W.R. Herndon
E.J. Sebes
R.K. Thomas
PART 2 Distributed and Federated Systems
Designing security agents for the DOK federated system
35(25)
Z. Tari
Web implementation of a security mediator for medical databases
60(13)
G. Wiederhold
M. Bilello
C. Donahue
Supporting the requirements for multilevel secure and real-time databases in distributed environments
73(22)
S.H. Son
C. Chaney
PART 3 Object-Oriented Systems
A Principled approach to object deletion and garbage collection in a multi-level secure object bases
95(15)
E. Bertino
E. Ferrari
Compile-time flow analysis of transactions and methods in object-oriented databases
110(24)
M. Gendler-Fishman
E. Gudes
Capability-based primitives for access control in object-oriented systems
134(17)
J. Hale
J. Threet
S. Shenoi
PART 4 Work flow
An execution model for multilevel secure workflows
151(15)
V. Atluri
W. Huang
E. Bertino
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management
166(16)
R.K. Thomas
R.S. Sandhu
Alter-egos and roles: supporting workflow security in cyberspaces
182(17)
E. Gudes
R.P. van de Riet
H.F.M. Burg
M. Olivier
PART 5 Architectures and Systems
A Two-tier coarse indexing scheme for MLS database systems
199(20)
S. Jajodia
R. Mukkamala
I. Ray
Replication does survive information warfare attacks
219(10)
J. McDermott
Priority-driven secure multiversion locking protocol for real-time secure database systems
229(18)
C. Park
S. Park
S. Son
PART 6 Role-based Access Control
Software architectural alternatives for user role-based security policies
247(15)
S. Demurjian
T.C. Ting
J. Reisner
The URA97 model for role-based user-role assignment
262(17)
R. Sandhu
V. Bhamidipati
PART 7 Multilevel Security
IRI: a quantitative approach to inference analysis in relational databases
279(12)
K. Zhang
Structured name-spaces in secure databases
291(16)
A. Spalka
A.B. Cremers
Multilevel deccision logic: a formalism for rules mining
307(18)
T.Y. Lin
X. Zuo
PART 8 Policy Modeling
Access controls by object-oriented concepts
325(16)
W. Essmayr
G. Pernul
A.M. Tjoa
Administration policies in a multipolicy authorization system
341(15)
E. Bertino
E. Ferrari
Datafly: a system for providing anonymity in medical data
356(29)
L. Sweeney
PART 9 System Implementations
An environment for developing securely interoperable heterogeneous distributed objects
385(4)
M. Berryman
C. Rummel
M. Papa
J. Hale
J. Threet
S. Shenoi
Implementing advanced internet search engines
389(4)
G. Lorenz
S. Dangi
D. Jones
P. Carpenter
S. Shenoi
Index of contributors 393(2)
Keyword index 395

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.