Research Catalog

Data and applications security : developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000

Title
Data and applications security : developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 / edited by Bhavani Thuraisingham [and others].
Author
IFIP TC 11 WG 11.3 Working Conference on Database Security (14th : 2000 : Schoorl, Netherlands)
Publication
Boston : Kluwer Academic Publishers, 2001.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextRequest in advance QA76.9.D314 I34 2000Off-site

Holdings

Details

Additional Authors
Thuraisingham, Bhavani M.
Description
xiv, 376 pages : illustrations; 25 cm.
Series Statement
International Federation for Information Processing; 73
Uniform Title
International Federation for Information Processing (Series) ; 73.
Subject
Bibliography (note)
  • Includes bibliographical references and index.
Contents
  • Ch. 1. Protecting Information when Access is Granted for Collaboration / Gio Wiederhold -- Ch. 2. Author X: A Java-Based System for XML Data Protection / E. Bertino, M. Braun and S. Castano / [et al.] -- Ch. 3. A Fair-Exchange E-Commerce Protocol with Automated Dispute Resolution / Indrajit Ray, Indrakshi Ray and Natarajan Narasimhamurthi -- Ch. 4. XML Access Control Systems: A Component-Based Approach / E. Damiani, S. De Capitani di Vimercati and S. Paraboschi / [et al.] -- Ch. 5. A Configurable Security Architecture Prototype / Alexandre Hardy and Martin S. Olivier -- Ch. 6. Distributed Policies for Data Management - Making Policies Mobile / Susan Chapin, Don Faatz and Sushil Jajodia -- Ch. 7. Security Architecture of the Multimedia Mediator / Christian Altenschmidt, Joachim Biskup and Yucel Karabulut -- Ch. 8. Simulation and Analysis of Cryptographic Protocols / M. Papa, O. Bremer and S. Magill / [et al.] --
  • Ch. 9. Authentic Third-Party Data Publication / Premkumar Devanbu, Michael Gertz and Charles Martel / [et al.] -- Ch. 10. Protecting File Systems Against Corruption Using Checksums / Daniel Barbara, Rajni Goel and Sushil Jajodia -- Ch. 11. Web Security and Privacy, Panel 1 / Bhavani Thuraisingham -- Ch. 12. Coordinating Policy for Federated Applications / Ken Moody -- Ch. 13. Integrating Multilevel Security Policies in Multilevel Federated Database Systems / Marta Oliva and Felix Saltor -- Ch. 14. Wrappers - A Mechanism to Support State-Based Authorization in Web Applications / Martin S. Olivier and Ehud Gudes -- Ch. 15. An Integrated Framework for Database Privacy Protection / LiWu Chang and Ira S. Moskowitz -- Ch. 16. Discovery of Multi-level Security Policies / Christina Yip Chung, Michael Gertz and Karl Levitt -- Ch. 17. Protecting Deductive Databases from Unauthorized Retrievals / Steve Barker --
  • Ch. 18. Confidentiality vs Integrity in Secure Databases / Adrian Spalka and Armin B. Cremers -- Ch. 19. Extending SQL's Grant Operation to Limit Privileges / Arnon Rosenthal and Edward Sciore -- Ch. 20. Language Extensions for Programmable Security / J. Hale, R. Chandia and C. Campbell / [et al.] -- Ch. 21. Protecting Privacy from Continuous High-Resolution Satellite Surveillance / Soon Ae Chun and Vijayalakshmi Atluri -- Ch. 22. Database Security Integration Using Role-Based Access Control / Sylvia Osbron -- Ch. 23. User Role-Based Security Model for a Distributed Environment / S. Demurjian, T. C. Ting and J. Balthazar / [et al.] -- Ch. 24. WorkFlow Analyzed for Security and Privacy in using Databases / Wouter Teepe, Reind van de Riet and Martin Olivier -- Ch. 25. Identifying Security Holes in OLAP Applications / Jurgen Steger, Holger Gunzel and Andreas Bauer --
  • Ch. 26. Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations / Marc Donner, David Nochlin and Dennis Shasha / [et al.] -- Ch. 17. Database Security 2000 / John R. Campbell -- Ch. 28. Declarative Semantics of Belief Queries in MLS Deductive Databases / Hasan M. Jamil -- Ch. 29. Trust Management in Distributed Databases / James B. Michael and Leonard T. Gaines -- Ch. 30. Active Authorization as High-level Control / Daniel Cvrcek -- Ch. 31. Conference Key Agreement Protocol using Oblivious Transfer / Ari Moesriami Barmawi, Shingo Takada and Norihisa Doi -- Ch. 32. An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task / Sejong Oh and Soeg Park -- Ch. 32. Authorization Model in Object-Oriented Systems / Keiji Izaki, Katsuya Tanaka and Makoto Takizawa -- Ch. 33. Panel 2 / Reind van de Riet, Raban Serban and Sylvia Osborn / [et al.] --
  • Ch. 34. Conference Summary / Bhavani Thuraisingham.
ISBN
0792375149
LCCN
2001038478
OCLC
  • ocm47644439
  • SCSB-4308897
Owning Institutions
Columbia University Libraries