Database Security XI

Status and Prospects

  • T. Y. Lin
  • Shelly Qian

Table of contents

  1. Front Matter
    Pages i-vii
  2. Novel Systems

    1. Front Matter
      Pages 1-1
    2. Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, T. Y. Lin, Sushil Jajodia, Chris Clifton
      Pages 3-16
    3. Catherine D. McCollum, Donald B. Faatz, William R. Herndon, Edward John Sebes, Roshan K. Thomas
      Pages 17-31
  3. Distributed and Federated Systems

  4. Object-Oriented Systems

  5. Work flow

    1. Front Matter
      Pages 149-149
    2. Vijayalakshmi Atluria, Wei-Kuang Huang, Elisa Bertino
      Pages 151-165
    3. E. Gudes, R. P. van de Riet, J. F. M. Burg, M. S. Olivier
      Pages 182-195
  6. Architectures and Systems

    1. Front Matter
      Pages 197-197
    2. Sushil Jajodia, Ravi Mukkamala, Indrajit Raya
      Pages 199-218
  7. Role-based Access Control

    1. Front Matter
      Pages 245-245
    2. S. A. Demurjian Sr, T. C. Ting, J. A. Reisner
      Pages 247-261
    3. Ravi Sandhu, Venkata Bhamidipati
      Pages 262-275
  8. Multilevel Security

    1. Front Matter
      Pages 277-277
    2. Adrian Spalka, Armin B. Cremers
      Pages 291-306
    3. T. Y. Lin, Xiaoling Zuo
      Pages 307-321
  9. Policy Modeling

    1. Front Matter
      Pages 323-323
    2. W. Essmayr, G. Pernul, A. M. Tjoa
      Pages 325-340
    3. Elisa Bertino, Elena Ferrari
      Pages 341-355
  10. System Implementations

    1. Front Matter
      Pages 383-383
    2. M. Berryman, C. Rummel, M. Papa, J. Threet, S. Shenoi, John Hale
      Pages 385-388
    3. G. Lorenz, S. Dangi, D. Jones, P. Carpenter, S. Shenoi
      Pages 389-391
  11. Back Matter
    Pages 393-395

About this book


This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students with a broad perspective of recent developments in what is recognised as a key topic in business and in the public sector.


Access Microsoft Access architecture architectures control database development implementation modeling object security

Editors and affiliations

  • T. Y. Lin
    • 1
  • Shelly Qian
    • 2
  1. 1.San Jose State UniversityUSA
  2. 2.SecureSoft Inc.USA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag US 1998
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-5041-2914-5
  • Online ISBN 978-0-387-35285-5
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software
Consumer Packaged Goods