Research Catalog
Data and applications security : developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000
- Title
- Data and applications security : developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 / edited by Bhavani Thuraisingham [and others].
- Author
- IFIP TC 11 WG 11.3 Working Conference on Database Security (14th : 2000 : Schoorl, Netherlands)
- Publication
- Boston : Kluwer Academic Publishers, 2001.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Request in advance | QA76.9.D314 I34 2000 | Off-site |
Holdings
Details
- Additional Authors
- Thuraisingham, Bhavani M.
- Description
- xiv, 376 pages : illustrations; 25 cm.
- Series Statement
- International Federation for Information Processing; 73
- Uniform Title
- International Federation for Information Processing (Series) ; 73.
- Subject
- Bibliography (note)
- Includes bibliographical references and index.
- Contents
- Ch. 1. Protecting Information when Access is Granted for Collaboration / Gio Wiederhold -- Ch. 2. Author X: A Java-Based System for XML Data Protection / E. Bertino, M. Braun and S. Castano / [et al.] -- Ch. 3. A Fair-Exchange E-Commerce Protocol with Automated Dispute Resolution / Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi -- Ch. 4. XML Access Control Systems: A Component-Based Approach / E. Damiani, S. De Capitani di Vimercati and S. Paraboschi / [et al.] -- Ch. 5. A Configurable Security Architecture Prototype / Alexandre Hardy and Martin S. Olivier -- Ch. 6. Distributed Policies for Data Management - Making Policies Mobile / Susan Chapin, Don Faatz and Sushil Jajodia -- Ch. 7. Security Architecture of the Multimedia Mediator / Christian Altenschmidt, Joachim Biskup and Yucel Karabulut -- Ch. 8. Simulation and Analysis of Cryptographic Protocols / M. Papa, O. Bremer and S. Magill / [et al.] --
- Ch. 9. Authentic Third-Party Data Publication / Premkumar Devanbu, Michael Gertz and Charles Martel / [et al.] -- Ch. 10. Protecting File Systems Against Corruption Using Checksums / Daniel Barbara, Rajni Goel and Sushil Jajodia -- Ch. 11. Web Security and Privacy, Panel 1 / Bhavani Thuraisingham -- Ch. 12. Coordinating Policy for Federated Applications / Ken Moody -- Ch. 13. Integrating Multilevel Security Policies in Multilevel Federated Database Systems / Marta Oliva and Felix Saltor -- Ch. 14. Wrappers - A Mechanism to Support State-Based Authorization in Web Applications / Martin S. Olivier and Ehud Gudes -- Ch. 15. An Integrated Framework for Database Privacy Protection / LiWu Chang and Ira S. Moskowitz -- Ch. 16. Discovery of Multi-level Security Policies / Christina Yip Chung, Michael Gertz and Karl Levitt -- Ch. 17. Protecting Deductive Databases from Unauthorized Retrievals / Steve Barker --
- Ch. 18. Confidentiality vs Integrity in Secure Databases / Adrian Spalka and Armin B. Cremers -- Ch. 19. Extending SQL's Grant Operation to Limit Privileges / Arnon Rosenthal and Edward Sciore -- Ch. 20. Language Extensions for Programmable Security / J. Hale, R. Chandia and C. Campbell / [et al.] -- Ch. 21. Protecting Privacy from Continuous High-Resolution Satellite Surveillance / Soon Ae Chun and Vijayalakshmi Atluri -- Ch. 22. Database Security Integration Using Role-Based Access Control / Sylvia Osbron -- Ch. 23. User Role-Based Security Model for a Distributed Environment / S. Demurjian, T. C. Ting and J. Balthazar / [et al.] -- Ch. 24. WorkFlow Analyzed for Security and Privacy in using Databases / Wouter Teepe, Reind van de Riet and Martin Olivier -- Ch. 25. Identifying Security Holes in OLAP Applications / Jurgen Steger, Holger Gunzel and Andreas Bauer --
- Ch. 26. Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations / Marc Donner, David Nochlin and Dennis Shasha / [et al.] -- Ch. 17. Database Security 2000 / John R. Campbell -- Ch. 28. Declarative Semantics of Belief Queries in MLS Deductive Databases / Hasan M. Jamil -- Ch. 29. Trust Management in Distributed Databases / James B. Michael and Leonard T. Gaines -- Ch. 30. Active Authorization as High-level Control / Daniel Cvrcek -- Ch. 31. Conference Key Agreement Protocol using Oblivious Transfer / Ari Moesriami Barmawi, Shingo Takada and Norihisa Doi -- Ch. 32. An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task / Sejong Oh and Soeg Park -- Ch. 32. Authorization Model in Object-Oriented Systems / Keiji Izaki, Katsuya Tanaka and Makoto Takizawa -- Ch. 33. Panel 2 / Reind van de Riet, Raban Serban and Sylvia Osborn / [et al.] --
- Ch. 34. Conference Summary / Bhavani Thuraisingham.
- ISBN
- 0792375149
- LCCN
- 2001038478
- OCLC
- ocm47644439
- SCSB-4308897
- Owning Institutions
- Columbia University Libraries