Advertisement

Database Security XI

Status and Prospects

  • T. Y. Lin
  • Shelly Qian

Table of contents

  1. Front Matter
    Pages i-vii
  2. Novel Systems

    1. Front Matter
      Pages 1-1
    2. Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, T. Y. Lin, Sushil Jajodia, Chris Clifton
      Pages 3-16
    3. Catherine D. McCollum, Donald B. Faatz, William R. Herndon, Edward John Sebes, Roshan K. Thomas
      Pages 17-31
  3. Distributed and Federated Systems

  4. Object-Oriented Systems

  5. Work flow

    1. Front Matter
      Pages 149-149
    2. Vijayalakshmi Atluria, Wei-Kuang Huang, Elisa Bertino
      Pages 151-165
    3. E. Gudes, R. P. van de Riet, J. F. M. Burg, M. S. Olivier
      Pages 182-195
  6. Architectures and Systems

    1. Front Matter
      Pages 197-197
    2. Sushil Jajodia, Ravi Mukkamala, Indrajit Raya
      Pages 199-218
  7. Role-based Access Control

    1. Front Matter
      Pages 245-245
    2. S. A. Demurjian Sr, T. C. Ting, J. A. Reisner
      Pages 247-261
    3. Ravi Sandhu, Venkata Bhamidipati
      Pages 262-275
  8. Multilevel Security

    1. Front Matter
      Pages 277-277
    2. Adrian Spalka, Armin B. Cremers
      Pages 291-306
    3. T. Y. Lin, Xiaoling Zuo
      Pages 307-321
  9. Policy Modeling

    1. Front Matter
      Pages 323-323
    2. W. Essmayr, G. Pernul, A. M. Tjoa
      Pages 325-340
    3. Elisa Bertino, Elena Ferrari
      Pages 341-355
  10. System Implementations

    1. Front Matter
      Pages 383-383
    2. M. Berryman, C. Rummel, M. Papa, J. Threet, S. Shenoi, John Hale
      Pages 385-388
    3. G. Lorenz, S. Dangi, D. Jones, P. Carpenter, S. Shenoi
      Pages 389-391
  11. Back Matter
    Pages 393-395

About this book

Introduction

This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students with a broad perspective of recent developments in what is recognised as a key topic in business and in the public sector.

Keywords

Access Microsoft Access architecture architectures control database development implementation modeling object security

Editors and affiliations

  • T. Y. Lin
    • 1
  • Shelly Qian
    • 2
  1. 1.San Jose State UniversityUSA
  2. 2.SecureSoft Inc.USA

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-35285-5
  • Copyright Information Springer-Verlag US 1998
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-5041-2914-5
  • Online ISBN 978-0-387-35285-5
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site
Industry Sectors
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Engineering