Borrow it
- African Studies Library
- Alumni Medical Library
- Astronomy Library
- Fineman and Pappas Law Libraries
- Frederick S. Pardee Management Library
- Howard Gotlieb Archival Research Center
- Mugar Memorial Library
- Music Library
- Pikering Educational Resources Library
- School of Theology Library
- Science & Engineering Library
- Stone Science Library
The Resource Database Security XII : Status and Prospects, edited by Sushil Jajodia, (electronic resource)
Database Security XII : Status and Prospects, edited by Sushil Jajodia, (electronic resource)
Resource Information
The item Database Security XII : Status and Prospects, edited by Sushil Jajodia, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Database Security XII : Status and Prospects, edited by Sushil Jajodia, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
- Summary
- New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce Informational Assurances Workflow Privacy Policy Modeling Mediation Information Warfare Defense Multilevel Security Role-based Access Controls Mobile Databases Inference Data Warehouses and Data Mining. This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece. Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development
- Language
- eng
- Extent
- XX, 296 p.
- Contents
-
- I Invited Talks
- 1 E-Commerce Security: No Silver Bullet
- 2 Technical Enforcement of Informational Assurances
- II Workflow
- 3 Analyzing the Safety of Workflow Authorization Models
- 4 Rules and Patterns for Security in Workflow Systems
- III Privacy
- 5 An information-flow model for Privacy (InfoPriv)
- IV Policy Modeling
- 6 Security Policies in Replicated and Autonomous Databases
- 7 Programmable Security for Object-Oriented Systems
- V Mediation
- 8 Secure Mediation: Requirements and Design
- VI Information Warfare Defense
- 9 Reconstructing the Database after Electronic Attacks
- VII Multilevel Security
- 10 Version Management in the STAR MLS Database System
- 11 SACADDOS: a support tool to manage multilevel documents
- VIII Role-based Access Controls
- 12 Using Role-Templates for Handling Recurring Role Structures
- 13 Role Based Security and Java
- IX Mobile Databases
- 14 Security Issues in Mobile Database Access
- X Inference
- 15 Bayesian Methods Applied to the Database Inference Problem
- 16 The Design and Implementation of a Data Level Database Inference Detection System
- XI Pane
- 17 Security and Privacy Issues for the World Wide Web: Panel Discussion
- XII Discussion Summary
- 18 Workshop Summary
- Isbn
- 9780387355641
- Label
- Database Security XII : Status and Prospects
- Title
- Database Security XII
- Title remainder
- Status and Prospects
- Statement of responsibility
- edited by Sushil Jajodia
- Subject
-
- Computer Science
- Computer science
- Data Structures, Cryptology and Information Theory
- Data structures (Computer science)
- Electronic resources
- Information Storage and Retrieval
- Information Systems
- Information storage and retrieval systems
- Management information systems
- Management of Computing and Information Systems
- Business Information Systems
- Language
- eng
- Summary
- New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce Informational Assurances Workflow Privacy Policy Modeling Mediation Information Warfare Defense Multilevel Security Role-based Access Controls Mobile Databases Inference Data Warehouses and Data Mining. This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece. Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development
- http://library.link/vocab/creatorName
- Jajodia, Sushil
- Image bit depth
- 0
- LC call number
- QA76.9.D35
- Literary form
- non fiction
- http://library.link/vocab/relatedWorkOrContributorName
- SpringerLink
- Series statement
- IFIP — The International Federation for Information Processing,
- Series volume
- 14
- http://library.link/vocab/subjectName
-
- Computer science
- Data structures (Computer science)
- Information storage and retrieval systems
- Information Systems
- Management information systems
- Computer Science
- Data Structures, Cryptology and Information Theory
- Management of Computing and Information Systems
- Business Information Systems
- Information Storage and Retrieval
- Label
- Database Security XII : Status and Prospects, edited by Sushil Jajodia, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- I Invited Talks -- 1 E-Commerce Security: No Silver Bullet -- 2 Technical Enforcement of Informational Assurances -- II Workflow -- 3 Analyzing the Safety of Workflow Authorization Models -- 4 Rules and Patterns for Security in Workflow Systems -- III Privacy -- 5 An information-flow model for Privacy (InfoPriv) -- IV Policy Modeling -- 6 Security Policies in Replicated and Autonomous Databases -- 7 Programmable Security for Object-Oriented Systems -- V Mediation -- 8 Secure Mediation: Requirements and Design -- VI Information Warfare Defense -- 9 Reconstructing the Database after Electronic Attacks -- VII Multilevel Security -- 10 Version Management in the STAR MLS Database System -- 11 SACADDOS: a support tool to manage multilevel documents -- VIII Role-based Access Controls -- 12 Using Role-Templates for Handling Recurring Role Structures -- 13 Role Based Security and Java -- IX Mobile Databases -- 14 Security Issues in Mobile Database Access -- X Inference -- 15 Bayesian Methods Applied to the Database Inference Problem -- 16 The Design and Implementation of a Data Level Database Inference Detection System -- XI Pane -- 17 Security and Privacy Issues for the World Wide Web: Panel Discussion -- XII Discussion Summary -- 18 Workshop Summary
- Dimensions
- unknown
- Extent
- XX, 296 p.
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9780387355641
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-0-387-35564-1
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-0-387-35564-1
- Label
- Database Security XII : Status and Prospects, edited by Sushil Jajodia, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- I Invited Talks -- 1 E-Commerce Security: No Silver Bullet -- 2 Technical Enforcement of Informational Assurances -- II Workflow -- 3 Analyzing the Safety of Workflow Authorization Models -- 4 Rules and Patterns for Security in Workflow Systems -- III Privacy -- 5 An information-flow model for Privacy (InfoPriv) -- IV Policy Modeling -- 6 Security Policies in Replicated and Autonomous Databases -- 7 Programmable Security for Object-Oriented Systems -- V Mediation -- 8 Secure Mediation: Requirements and Design -- VI Information Warfare Defense -- 9 Reconstructing the Database after Electronic Attacks -- VII Multilevel Security -- 10 Version Management in the STAR MLS Database System -- 11 SACADDOS: a support tool to manage multilevel documents -- VIII Role-based Access Controls -- 12 Using Role-Templates for Handling Recurring Role Structures -- 13 Role Based Security and Java -- IX Mobile Databases -- 14 Security Issues in Mobile Database Access -- X Inference -- 15 Bayesian Methods Applied to the Database Inference Problem -- 16 The Design and Implementation of a Data Level Database Inference Detection System -- XI Pane -- 17 Security and Privacy Issues for the World Wide Web: Panel Discussion -- XII Discussion Summary -- 18 Workshop Summary
- Dimensions
- unknown
- Extent
- XX, 296 p.
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9780387355641
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-0-387-35564-1
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-0-387-35564-1
Subject
- Computer Science
- Computer science
- Data Structures, Cryptology and Information Theory
- Data structures (Computer science)
- Electronic resources
- Information Storage and Retrieval
- Information Systems
- Information storage and retrieval systems
- Management information systems
- Management of Computing and Information Systems
- Business Information Systems
Member of
Library Locations
-
African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 -71.105717
-
Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 -71.107023
-
Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 -71.099547
-
Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 -71.108227
-
Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 -71.101425
-
School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 -71.107235
-
Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 -71.102257
-
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Database-Security-XII--Status-and-Prospects/OZxN1iW2By4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Database-Security-XII--Status-and-Prospects/OZxN1iW2By4/">Database Security XII : Status and Prospects, edited by Sushil Jajodia, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Database Security XII : Status and Prospects, edited by Sushil Jajodia, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Database-Security-XII--Status-and-Prospects/OZxN1iW2By4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Database-Security-XII--Status-and-Prospects/OZxN1iW2By4/">Database Security XII : Status and Prospects, edited by Sushil Jajodia, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>