Database and Application Security XV

IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

Editors:

ISBN: 978-1-4757-1028-1 (Print) 978-0-387-35587-0 (Online)

Table of contents (23 chapters)

previous Page of 2
  1. Front Matter

    Pages i-x

  2. Keynote Address

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-15

      Recent Advances in Access Control Models

  3. Role and Constraint-Based Access Control

    1. Front Matter

      Pages 17-17

    2. No Access

      Book Chapter

      Pages 19-30

      Role-Based Access Control on the Web Using LDAP

    3. No Access

      Book Chapter

      Pages 31-44

      Constraints-Based Access Control

    4. No Access

      Book Chapter

      Pages 45-58

      Secure Role-Based Workflow Models

  4. Distributed Systems

    1. Front Matter

      Pages 59-59

    2. No Access

      Book Chapter

      Pages 61-74

      Subject Switching Algorithms for Access Control in Federated Databases

    3. No Access

      Book Chapter

      Pages 75-89

      Efficient Damage Assessment and Repair in Resilient Distributed Database Systems

    4. No Access

      Book Chapter

      Pages 91-104

      Administering Permissions for Distributed Data: Factoring and Automated Inference

    5. No Access

      Book Chapter

      Pages 105-118

      State-Dependent Security Decisions for Distributed Object-Systems

  5. Information Warfare and Intrusion Detection

    1. Front Matter

      Pages 119-119

    2. No Access

      Book Chapter

      Pages 121-134

      Reorganization of the Database Log for Information Warfare Data Recovery

    3. No Access

      Book Chapter

      Pages 135-149

      Randomly Roving Agents for Intrusion Detection

    4. No Access

      Book Chapter

      Pages 151-164

      Public Telephone Network Vulnerabilities

  6. Relational Databases

    1. Front Matter

      Pages 165-165

    2. No Access

      Book Chapter

      Pages 167-180

      Flexible Security Policies in SQL

    3. No Access

      Book Chapter

      Pages 181-194

      The Inference Problem and Updates in Relational Databases

    4. No Access

      Book Chapter

      Pages 195-208

      Managing Classified Documents in a Relational Database

  7. Implementation Issues

    1. Front Matter

      Pages 209-209

    2. No Access

      Book Chapter

      Pages 211-224

      A Comparison Between ConSA and Current Linux Security Implementations

    3. No Access

      Book Chapter

      Pages 225-238

      A Novel Approach to Certificate Revocation Management

    4. No Access

      Book Chapter

      Pages 239-252

      ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications

  8. Multilevel Systems

    1. Front Matter

      Pages 253-253

    2. No Access

      Book Chapter

      Pages 255-268

      An Extended Transaction Model Approach for Multilevel Secure Transaction Processing

    3. No Access

      Book Chapter

      Pages 269-282

      Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System

  9. New Application Areas

    1. Front Matter

      Pages 283-283

    2. No Access

      Book Chapter

      Pages 285-297

      Security Procedures for Classification Mining Algorithms

previous Page of 2