Database and Application Security XV
Editat de Martin S. Olivier, David L. Spooneren Limba Engleză Hardback – 30 apr 2002
This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:
- Access control models;
- Role and constraint-based access control;
- Distributed systems;
- Information warfare and intrusion detection;
- Relational databases;
- Implementation issues;
- Multilevel systems;
- New application areas including XML.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 622.90 lei 6-8 săpt. | |
| Springer Us – 12 dec 2012 | 622.90 lei 6-8 săpt. | |
| Hardback (1) | 629.99 lei 6-8 săpt. | |
| Springer – 30 apr 2002 | 629.99 lei 6-8 săpt. |
Preț: 629.99 lei
Preț vechi: 787.49 lei
-20% Nou
Puncte Express: 945
Preț estimativ în valută:
111.46€ • 129.86$ • 97.33£
111.46€ • 129.86$ • 97.33£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781402070419
ISBN-10: 1402070411
Pagini: 348
Ilustrații: XII, 340 p.
Dimensiuni: 160 x 241 x 24 mm
Greutate: 0.69 kg
Ediția:2002
Editura: Springer
Locul publicării:New York, NY, United States
ISBN-10: 1402070411
Pagini: 348
Ilustrații: XII, 340 p.
Dimensiuni: 160 x 241 x 24 mm
Greutate: 0.69 kg
Ediția:2002
Editura: Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
I Keynote address.- Recent Advances in Access Control Models.- II Role and Constraint-Based Access Control.- Role-based Access Control on the Web Using LDAP.- Constraints-based Access Control.- Secure Role-Based Workflow Models.- III Distributed Systems.- Subject Switching Algorithms for Access Control in Federated Databases.- Efficient Damage Assessment and Repair in Resilient Distributed Database Systems.- Administering Permissions for Distributed Data: Factoring and Automated Inference.- State-Dependent Security Decisions for Distributed Object-Systems.- IV Information Warfare and Intrusion Detection.- Reorganization of Database Log for Information Warfare Data Recovery.- Randomly roving agents for intrusion detection.- Public Telephone Network Vulnerabilities.- V Relational Databases.- Flexible Security Policies in SQL.- The Inference Problem and Updates in Relational Databases.- Managing Classified Documents in a Relational Database.- VI Implementation Issues.- A Comparison Between ConSA and Current Linux Security Implementations.- A Novel Approach to Certificate Revocation Management.- ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications.- VII Multilevel Systems.- An Extended Transaction Model Approach for Multilevel Secure Transaction Processing.- Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System.- VIII New Application Areas.- Security Procedures for Classification Mining Algorithms.- Regulating Access to XML documents.- IX Panel and discussion.- Panel on XML and Security.- Selected Summary of Discussions.