Advertisement

Database Security IX

Status and prospects

  • David L. Spooner
  • Steven A. Demurjian
  • John E. Dobson

Table of contents

  1. Front Matter
    Pages i-xv
  2. Opening Session

  3. Federated and Replicated Databases

    1. Front Matter
      Pages 25-25
    2. I. S. Moskowitz, M. H. Kang
      Pages 61-75
  4. Object-Oriented Systems

    1. Front Matter
      Pages 77-77
    2. S. A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu
      Pages 79-94
    3. E. B. Fernandez, R. B. France, D. Wei
      Pages 95-110
    4. M. Schaefer, P. Martel, T. Kanawati, V. Lyons
      Pages 111-126
  5. Mandatory Access Control

    1. Front Matter
      Pages 127-127
    2. Matunda Nyanchama, Sylvia Osborn
      Pages 129-144
    3. Xiaolei Qian, Teresa F. Lunt
      Pages 165-180
  6. Concurrency Control

    1. Front Matter
      Pages 181-181
    2. Sang H. Son, Rasikan David, Bhavani Thuraisingham
      Pages 199-214
    3. Ravi Mukkamala, Sang H. Son
      Pages 215-230
  7. Design and Implementation of Access Controls

    1. Front Matter
      Pages 249-249
    2. Marvin Schaefera, Gary Smithb
      Pages 251-266
    3. R. Holbein, S. Teufel, K. Bauknecht
      Pages 267-285
  8. Role-Based Access Control and Next Generation Security Models

    1. Front Matter
      Pages 287-287
    2. Roshan Thomas, Elisa Bertino, Pierangela Samarati, Hans H. Brüggemann, Bret Hartman, Ravi Sandhu et al.
      Pages 289-298
  9. Inference Detection

    1. Front Matter
      Pages 299-299
    2. Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi
      Pages 317-332
    3. Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf
      Pages 333-348
  10. Secure Commercial Database Systems

    1. Front Matter
      Pages 349-349
    2. Marvin Schaefer, Ronda R. Henning, Roger L. Miller, Thomas J. Parenty, Jesse C. Worthington
      Pages 351-361
  11. Storage Jamming and Wrap-up

    1. Front Matter
      Pages 363-363
    2. J. Mcdermott, D. Goldschlag
      Pages 365-381
    3. David L. Spooner, Steven A. Demurjian, John E. Dobson
      Pages 382-387
  12. Informal Evening Session: Data Mining

    1. Front Matter
      Pages 389-389
    2. T. Y. Lin, T. H. Hinke, D. G. Marks, B. Thuraisingham
      Pages 391-399
  13. Back Matter
    Pages 400-402

About this book

Introduction

This book documents progress and presents a broad perspective of recent developments in database security. It also discusses in depth the current state-of-the-art in research in the field. A number of topics are explored in detail including: current reseearch in database security and the state of security controls in present commercial database systems. Database Security IX will be essential reading for advanced students working in the area of database security research and development in for industrial researchers in this technical area.

Keywords

access control concurrency data mining database database systems

Editors and affiliations

  • David L. Spooner
    • 1
  • Steven A. Demurjian
    • 2
  • John E. Dobson
    • 3
  1. 1.Rensselaer Polytechnic InstituteNew YorkUSA
  2. 2.University of ConnecticutConnecticutUSA
  3. 3.University of NewcastleNewcastleUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-34932-9
  • Copyright Information Springer-Verlag US 1996
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-5041-2954-1
  • Online ISBN 978-0-387-34932-9
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site