Research Advances in Database and Information Systems Security

IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA

Editors:

ISBN: 978-1-4757-6411-6 (Print) 978-0-387-35508-5 (Online)

Table of contents (21 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xxii

  2. Intrusion Detection

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-18

      Intrusion Confinement by Isolation in Information Systems

    3. No Access

      Book Chapter

      Pages 19-32

      Analyzing the Performance of Program Behavior Profiling for Intrusion Detection

    4. No Access

      Book Chapter

      Pages 33-46

      Integrating Data Mining Techniques with Intrusion Detection Methods

  3. Role-Based Access Control

    1. Front Matter

      Pages 47-47

    2. No Access

      Book Chapter

      Pages 49-62

      RBAC on the Web by Secure Cookies

    3. No Access

      Book Chapter

      Pages 63-78

      Emedac: Role-Based Access Control Supporting Discretionary and Mandatory Features

    4. No Access

      Book Chapter

      Pages 79-93

      Software Agents for Role Based Security

  4. Critical Infrastructure Protection Panel

    1. Front Matter

      Pages 95-95

    2. No Access

      Book Chapter

      Pages 97-113

      Selected Topics in Infrastructure and Information Assurance

  5. Policy/Modeling

    1. Front Matter

      Pages 115-115

    2. No Access

      Book Chapter

      Pages 117-125

      A Secret Splitting Method for Assuring the Confidentiality of Electronic Records

    3. No Access

      Book Chapter

      Pages 127-141

      For Unknown Secrecies Refusal is Better Than Lying

  6. Workflow Systems

    1. Front Matter

      Pages 143-143

    2. No Access

      Book Chapter

      Pages 145-159

      Extending the BFA Workflow Authorization Model to Express Weighted Voting

    3. No Access

      Book Chapter

      Pages 161-174

      A Strategy for an MLS Workflow Management System

  7. Data Mining/Data Warehousing

    1. Front Matter

      Pages 175-175

    2. No Access

      Book Chapter

      Pages 177-191

      Impact of Decision-Region Based Classification Mining Algorithms on Database Security

    3. No Access

      Book Chapter

      Pages 193-207

      Protecting Against Data Mining through Samples

    4. No Access

      Book Chapter

      Pages 209-223

      Security Administration for Federations, Warehouses, and Other Derived Data

  8. Intrusion Detection Panel

    1. Front Matter

      Pages 225-225

    2. No Access

      Book Chapter

      Pages 227-234

      Panel on Intrusion Detection

  9. Multilevel Security

    1. Front Matter

      Pages 235-235

    2. No Access

      Book Chapter

      Pages 237-251

      Enforcing Integrity while Maintaining Secrecy

    3. No Access

      Book Chapter

      Pages 253-268

      The Effect of Confidentiality on the Structure of Databases

  10. Temporal Authorization Models

    1. Front Matter

      Pages 269-269

    2. No Access

      Book Chapter

      Pages 271-284

      Temporal Authorization in the Simplified Event Calculus

    3. No Access

      Book Chapter

      Pages 285-300

      Specifying and Computing Hierarchies of Temporal Authorizations

  11. Object-Oriented Databases

    1. Front Matter

      Pages 301-301

    2. No Access

      Book Chapter

      Pages 303-316

      The Security Problem Against Inference Attacks on Object-Oriented Databases

  12. Back Matter

    Pages 331-332

previous Page of 2