Database and applications security : integrating information security and data management / Bhavani Thuraisingham.
By: Thuraisingham, Bhavani M [author.].
Material type: BookPublisher: Boca Raton, FL : Auerbach Publications, 2005Description: 1 online resource (xxxvi, 619 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9780203486061; 9781135489069; 9781135489106; 9781135489113; 9781466525450.Subject(s): Computer security | Database management | Database securityAdditional physical formats: Print version: : No titleDDC classification: 005.8 Online resources: Click here to view.Includes bibliographical references (pages 593-595) and index.
part, PART I: SUPPORTING TECHNOLOGIES FOR DATABASE AND APPLICATIONS SECURITY -- chapter 1 Introduction -- chapter 2 Data Management Technologies -- chapter 3 Information Security -- chapter 4 Information Management Technologies -- chapter Conclusion to Part I -- part, PART II: DISCRETIONARY SECURITY FOR DATABASE SYSTEMS -- chapter 5 Security Policies -- chapter 6 Policy Enforcement and Related Issues -- chapter Conclusion to Part II -- part, PART III: MANDATORY SECURITY FOR DATABASE SYSTEMS -- chapter 7 Historical Developments -- chapter 8 Design Principles -- chapter Conclusion to Part III -- part, PART IV: MULTILEVEL SECURE RELATIONAL DATABASE SYSTEMS -- chapter 9 Multilevel Relational Data Models -- chapter 10 Security Impact on Database Functions -- chapter 11 Prototypes and Products -- chapter Conclusion to Part IV -- part, PART V: THE INFERENCE PROBLEM -- chapter 12 A Perspective of the Inference Problem -- chapter 13 Security-Constraint Processing for Inference Control -- chapter 14 Conceptual Structures for Inference Control -- chapter Conclusion to Part V -- part, PART VI: SECURE DISTRIBUTED AND HETEROGENEOUS DATABASE SYSTEMS -- chapter 15 Discretionary Security for Distributed Database Systems -- chapter 16 Multilevel Security for Distributed Database Systems -- chapter 17 Secure Heterogeneous and Federated Database Systems -- chapter Conclusion to Part VI -- part, PART VII: SECURE OBJECT AND MULTIMEDIA SYSTEMS -- chapter 18 Discretionary and Multilevel Security for Object Database Systems -- chapter 19 Aspects of Objects and Security -- chapter 20 Secure Multimedia Data Management Systems -- chapter Conclusion to Part VII -- part, PART VIII: DATA WAREHOUSING, DATA MINING, SECURITY, AND PRIVACY -- chapter 21 Secure Data Warehousing -- chapter 22 Data Mining for Security Applications -- chapter 23 Privacy -- chapter Conclusion to Part VIII -- part, PART IX: SECURE WEB DATA AND INFORMATION MANAGEMENT TECHNOLOGIES -- chapter 24 Secure Web Data Management and Digital Libraries -- chapter 25 Security for XML, RDF, and the Semantic Web -- chapter 26 Secure E-Commerce, Collaboration, and Knowledge Management -- chapter Conclusion to Part IX -- part, PART X: EMERGING SECURE DATA MANAGEMENT TECHNOLOGIES AND APPLICATIONS -- chapter 27 Secure Dependable Data Management -- chapter 28 Secure Sensor and Wireless Information Management -- chapter 29 Digital Identity, Forensics, and Related Topics -- chapter Conclusion to Part X -- chapter 30 Summary and Directions.
There are no comments for this item.