Data and applications security :developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, the Netherlands, August 21-23, 2000
附註:Includes bibliographical references and index.
Cover -- Table of Contents -- Preface -- List of Contributors -- Chapter 1 Keynote I Protecting Information when Access is Granted for Collaboration -- Chapter 2 Author X: A Java-Based System for XML Data Protection -- Chapter 3 A Fair-Exchange E-commerce Protocol with Automated Dispute Resolution -- Chapter 4 XML Access Control Systems: A Component-Based Approach -- Chapter 5 A Configurable Security Ar -- Chapter 6 Distributed Policies for Dtat Management -- Making Policies Mobile -- Chapter 7 Security Architecture of the Multimedia Mediator -- Chapter 8 Simulation and Analysis of Cryptogrpahic Protocols -- Chapter 9 Authentic Third-Party Data Publication -- Chapter 10 Protecting File Systems Against Corruption Using Checksums -- Chapter 11 Web Security and Privacy, Panel 1 -- Chapter 12 Keynote II Coordinating Policy for Federated Applications -- Chapter 13 Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Chapter 14 Wrappers -- A Mechanism to Support State-Based Authorization in Web Applications -- Chapter 15 An Integrated Framework for Database Privacy Protection -- Chapter 16 Discovery of Multi-level Security Policies -- Chapter 17 Protecting Deductive Databases from Unauthorized Retrievals -- Chapter 18 Confiedentiality vs Integrity in Secure Databases -- Chapter 19 Extending SQL's Grant Operation to Limit Privileges -- Chapter 20 Language Extensions for Programmable Security -- Chapter 21 Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Chapter 22 Database Security Integration Using Role-Based Access Control -- Chapter 23 User Role-Based Security Model for a Distributed Environment -- Chapter 24 WorkFlow Analyzed for Security and Privacy in using Databases -- Chapter 25 Identifying Security Holes in OLAP Applications -- Chapter 26 Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Chapter 27 Database Security 2000 -- Chapter 28 De
摘要:New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.