Abstract
This chapter provides an overview of some of the cyber threats information systems as well as data management systems and then discusses potential solutions and challenges. The threats include access control violations, unauthorized intrusions and inference and aggregation. Solutions include role-based access control, data mining techniques and security constraint processing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Air Force Summer Study Report on Multilevel Secure Database Systems, Washington DC, 1983.
B. Carminati, E. Bertino, E. Ferrai, B. Thuraisingham, A. Gupta. Secure Third Party Publishing of XML Documents. MIT Working Paper, 2002.
D. Denning. Cryptography and Data Security. Addison Wesley, 1983.
P Dokas, L Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, P. Tan. Data Mining for Intrusion Detection. Proceedings NSF Workshop on Next Generation Data Mining, Baltimore, MD, November 2002.
Ghosh. E-commerce Security, Weak Links and Strong Defenses, John Wiley, NY, 1998.
IFIP 11.3 Database Security Conference Proceedings, 1990–2002.
National Computer Security Conference Proceedings, 1990–1999.
National Science Foundation, www.nsf.gov.
Proceedings of the Symposium on Role-based Access Control, 2002–2003.
B. Thuraisingham. Multilevel Security for Relational Database Systems Augmented by an Inference Engine. Computers and Security, December 1987.
B. Thuraisingham, W. Ford, M. Collins. Design and Implementation of a Database Inference Controller. Journal on Data and Knowledge Engineering, December 1993.
B. Thuraisingham, W. Ford. Security Constraint Processing in a Multilevel Distributed Database Management System. IEEE Transactions on Knowledge and Data Engineering, April 1995.
B. Thuraisingham. Data Mining: Technologies, Techniques, Tools and Trends. CRC Press, FL, 1998.
B. Thuraisingham. Data Mining, National Security and Privacy. SIGKDD Explorations, January 2003.
B. Thuraisingham. Web Data Mining: Technologies and Their Applications to Business Intelligence and Counter-terrorism. CRC Press, FL, 2003.
B. Thuraisingham. Privacy Constraint Processing. To be submitted to Computers and Security, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Thuraisingham, B. (2005). Managing Threats to Web Databases and Cyber Systems. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds) Managing Cyber Threats. Massive Computing, vol 5. Springer, Boston, MA. https://doi.org/10.1007/0-387-24230-9_1
Download citation
DOI: https://doi.org/10.1007/0-387-24230-9_1
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24226-2
Online ISBN: 978-0-387-24230-9
eBook Packages: Computer ScienceComputer Science (R0)