© 2002

Database and Application Security XV

IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

  • Martin S. Olivier
  • David L. Spooner

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 87)

Table of contents

  1. Front Matter
    Pages i-x
  2. Keynote Address

    1. Front Matter
      Pages 1-1
    2. Sushil Jajodia, Duminda Wijesekera
      Pages 3-15
  3. Role and Constraint-Based Access Control

    1. Front Matter
      Pages 17-17
    2. Joon S. Park, Gail-Joon Ahn, Ravi Sandhu
      Pages 19-30
    3. Wee Yeh Tan
      Pages 31-44
    4. Savith Kandala, Ravi Sandhu
      Pages 45-58
  4. Distributed Systems

    1. Front Matter
      Pages 59-59
    2. Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia
      Pages 61-74
    3. Joachim Biskup, Thomas Leineweber
      Pages 105-118
  5. Information Warfare and Intrusion Detection

    1. Front Matter
      Pages 119-119
    2. Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth E. Longdon
      Pages 135-149
    3. G. Lorenz, J. Keller, G. Manes, J. Hale, S. Shenoi
      Pages 151-164
  6. Relational Databases

    1. Front Matter
      Pages 165-165
    2. Steve Barker, Arson Rosenthal
      Pages 167-180
    3. Csilla Farkas, Tyrone S. Toland, Caroline M. Eastman
      Pages 181-194

About this book


Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, security issues have become a primary concern in business, industry, government and society. These concerns are compounded by the expanding use of the Internet and wireless communication technologies.

This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:

  • Access control models;
  • Role and constraint-based access control;
  • Distributed systems;
  • Information warfare and intrusion detection;
  • Relational databases;
  • Implementation issues;
  • Multilevel systems;
  • New application areas including XML.

Database and Application Security XV contains papers, keynote addresses, and panel discussions from the Fifteenth Annual Working Conference on Database and Application Security, organized by the International Federation for Information Processing (IFIP) Working Group 11.3 and held July 15-18, 2001 in Niagara on the Lake, Ontario, Canada.


Automat Linux SQL algorithms communication database distributed systems information organization relational database

Editors and affiliations

  • Martin S. Olivier
    • 1
  • David L. Spooner
    • 2
  1. 1.Rand Afrikaans UniversitySouth Africa
  2. 2.Rensselaer Polytechnic InstituteUSA

Bibliographic information

Industry Sectors
IT & Software