Database Security, VIII: Status and Prospects
Elsevier Science Ltd (Verlag)
978-0-444-81976-5 (ISBN)
- Keine Verlagsinformationen verfügbar
- Artikel merken
The current state of database security research and practice is explored in this volume. Contributions are sourced from a wide range of international specialists involved in the field, ensuring a comprehensive cross-fertilization of ideas. Progress achieved in the following areas is given particular emphasis: user groups and roles; database architecture; inference analysis and control; database models; queries, updates and transactions; policy modelling; access control and application design. Invited papers provide a perspective on the implications of security in health care systems, plus current trends in database technology and their impact on security concepts.
Part 1 Invited lectures: special care needed for the heart of medical information systems, A.R. Bakker; current trends in database technology and their impact on security concepts, K.R. Dittrich and D. Jonscher. Part 2 User groups and roles: access rights administration in role-based security systems, M. Nyanchama and S. Osborn; user group structures in object-oriented database authorization, E.B. Fernandez et al; unifying structural and security modelling and analyses in the ADAM object-oriented design and environment, M.-Y. Hu et al. Part 3 Database architecture: the SINTRA data model - structure and operations, O. Costich et al; the b2/c3 problem - how big buffers overcome covert channel cynicism in trusted database systems, J. McDermott; trusted RUBIX - a multilevel secure client-server dbms, J.P. O'Connor. Part 4 Inference analysis and control: a practical formalism for imprecise inference control, J. Hale et al; hypersemantic data modelling for inference analysis, D.G. Marks et al. Part 5 Database models: a multilevel secure federated database, M.S. Olivier; a new authorization model for object-oriented databases, E. Bertino et al; the integration of security and integrity constraints in MOKUM, R.P. van de Riet and J. Beukering. Part 6 Queries, updates and transactions: field level classification and SQL, S. Wiseman; degrees of isolation, concurrency control protocols and commit protocols, V. Atluri et al. Part 7 Policy modelling: providing consistent views in a polyinstantiated database, L. Cholvy and F. Cuppens; secure logic databases allowed to reveal indefinite information on secrets, A. Spalka. Part 8 Access control and application design: a fine grained access control model for object-oriented dbms, A. Rosenthal et al; creating abstract discretionary modification policies with reconfigurable data objects, T. Gross; security guidelines for database systems development, G. Pangalos. Part 9 Status reports on current projects and panel: trusted ONTOS prototype - preliminary considerations, M. Schaefer and S. Wade; security object modelling for level-based policies, G. Pernul; enforcement of state dependent security specifications, J. Biskup and Eckert; a contemporary survey of discretionary access control policy assurance in commercial trusted relational dbms, M. Schaefer; perspectives on database security - panel summary, panel chair - M. Morgenstern, panelists - J. Biskup et al. Part 10 Discussion summary: summary of the conference discussions - eighth IFIP WG11.3 conference on database security, M. Morgenstern; research question list (IFIP WG11.3 database security).
Erscheint lt. Verlag | 24.1.1995 |
---|---|
Reihe/Serie | IFIP Transactions A: Computer Science and Technology ; Vol A-60 |
Verlagsort | Oxford |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Informatik ► Theorie / Studium ► Kryptologie | |
Recht / Steuern ► Privatrecht / Bürgerliches Recht ► IT-Recht | |
ISBN-10 | 0-444-81976-2 / 0444819762 |
ISBN-13 | 978-0-444-81976-5 / 9780444819765 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich