Skip to main content

Managing Threats to Web Databases and Cyber Systems

  • Chapter
Book cover Managing Cyber Threats

Part of the book series: Massive Computing ((MACO,volume 5))

Abstract

This chapter provides an overview of some of the cyber threats information systems as well as data management systems and then discusses potential solutions and challenges. The threats include access control violations, unauthorized intrusions and inference and aggregation. Solutions include role-based access control, data mining techniques and security constraint processing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Air Force Summer Study Report on Multilevel Secure Database Systems, Washington DC, 1983.

    Google Scholar 

  2. B. Carminati, E. Bertino, E. Ferrai, B. Thuraisingham, A. Gupta. Secure Third Party Publishing of XML Documents. MIT Working Paper, 2002.

    Google Scholar 

  3. D. Denning. Cryptography and Data Security. Addison Wesley, 1983.

    Google Scholar 

  4. P Dokas, L Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, P. Tan. Data Mining for Intrusion Detection. Proceedings NSF Workshop on Next Generation Data Mining, Baltimore, MD, November 2002.

    Google Scholar 

  5. Ghosh. E-commerce Security, Weak Links and Strong Defenses, John Wiley, NY, 1998.

    Google Scholar 

  6. IFIP 11.3 Database Security Conference Proceedings, 1990–2002.

    Google Scholar 

  7. National Computer Security Conference Proceedings, 1990–1999.

    Google Scholar 

  8. National Science Foundation, www.nsf.gov.

    Google Scholar 

  9. Proceedings of the Symposium on Role-based Access Control, 2002–2003.

    Google Scholar 

  10. B. Thuraisingham. Multilevel Security for Relational Database Systems Augmented by an Inference Engine. Computers and Security, December 1987.

    Google Scholar 

  11. B. Thuraisingham, W. Ford, M. Collins. Design and Implementation of a Database Inference Controller. Journal on Data and Knowledge Engineering, December 1993.

    Google Scholar 

  12. B. Thuraisingham, W. Ford. Security Constraint Processing in a Multilevel Distributed Database Management System. IEEE Transactions on Knowledge and Data Engineering, April 1995.

    Google Scholar 

  13. B. Thuraisingham. Data Mining: Technologies, Techniques, Tools and Trends. CRC Press, FL, 1998.

    Google Scholar 

  14. B. Thuraisingham. Data Mining, National Security and Privacy. SIGKDD Explorations, January 2003.

    Google Scholar 

  15. B. Thuraisingham. Web Data Mining: Technologies and Their Applications to Business Intelligence and Counter-terrorism. CRC Press, FL, 2003.

    Google Scholar 

  16. B. Thuraisingham. Privacy Constraint Processing. To be submitted to Computers and Security, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Thuraisingham, B. (2005). Managing Threats to Web Databases and Cyber Systems. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds) Managing Cyber Threats. Massive Computing, vol 5. Springer, Boston, MA. https://doi.org/10.1007/0-387-24230-9_1

Download citation

  • DOI: https://doi.org/10.1007/0-387-24230-9_1

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-24226-2

  • Online ISBN: 978-0-387-24230-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics