Database security, VIII : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Bad Salzdetfurth, Germany, 23-26 August 1994
Author(s)
Bibliographic Information
Database security, VIII : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Bad Salzdetfurth, Germany, 23-26 August 1994
(IFIP transactions, A . Computer science and technology ; 60)
North-Holland, 1994
- Other Title
-
Database security 8
Available at / 10 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references
Description and Table of Contents
Description
The current state of database security research and practice is explored in this volume. Contributions are sourced from a wide range of international specialists involved in the field, ensuring a comprehensive cross-fertilization of ideas. Progress achieved in the following areas is given particular emphasis: user groups and roles; database architecture; inference analysis and control; database models; queries, updates and transactions; policy modelling; access control and application design. Invited papers provide a perspective on the implications of security in health care systems, plus current trends in database technology and their impact on security concepts.
Table of Contents
- Part 1 Invited lectures: special care needed for the heart of medical information systems, A.R. Bakker
- current trends in database technology and their impact on security concepts, K.R. Dittrich and D. Jonscher. Part 2 User groups and roles: access rights administration in role-based security systems, M. Nyanchama and S. Osborn
- user group structures in object-oriented database authorization, E.B. Fernandez et al
- unifying structural and security modelling and analyses in the ADAM object-oriented design and environment, M.-Y. Hu et al. Part 3 Database architecture: the SINTRA data model - structure and operations, O. Costich et al
- the b2/c3 problem - how big buffers overcome covert channel cynicism in trusted database systems, J. McDermott
- trusted RUBIX - a multilevel secure client-server dbms, J.P. O'Connor. Part 4 Inference analysis and control: a practical formalism for imprecise inference control, J. Hale et al
- hypersemantic data modelling for inference analysis, D.G. Marks et al. Part 5 Database models: a multilevel secure federated database, M.S. Olivier
- a new authorization model for object-oriented databases, E. Bertino et al
- the integration of security and integrity constraints in MOKUM, R.P. van de Riet and J. Beukering. Part 6 Queries, updates and transactions: field level classification and SQL, S. Wiseman
- degrees of isolation, concurrency control protocols and commit protocols, V. Atluri et al. Part 7 Policy modelling: providing consistent views in a polyinstantiated database, L. Cholvy and F. Cuppens
- secure logic databases allowed to reveal indefinite information on secrets, A. Spalka. Part 8 Access control and application design: a fine grained access control model for object-oriented dbms, A. Rosenthal et al
- creating abstract discretionary modification policies with reconfigurable data objects, T. Gross
- security guidelines for database systems development, G. Pangalos. Part 9 Status reports on current projects and panel: trusted ONTOS prototype - preliminary considerations, M. Schaefer and S. Wade
- security object modelling for level-based policies, G. Pernul
- enforcement of state dependent security specifications, J. Biskup and Eckert
- a contemporary survey of discretionary access control policy assurance in commercial trusted relational dbms, M. Schaefer
- perspectives on database security - panel summary, panel chair - M. Morgenstern, panelists - J. Biskup et al. Part 10 Discussion summary: summary of the conference discussions - eighth IFIP WG11.3 conference on database security, M. Morgenstern
- research question list (IFIP WG11.3 database security).
by "Nielsen BookData"