Abstract
This paper first describes the developments in data and applications security with a special emphasis on database security. It also discusses current work including security for data warehouses and e-commerce systems. Then it discuses some of the directions for data and applications security which includes secure semantic web, secure dependable information management, and secure sensor information management. Directions for privacy research are also given.
Chapter PDF
References
Agrawal, R. and R. Srikant, “Privacy-preserving Data Mining,” Proceedings of the ACM SIGMOD Conference, Dallas, TX, May 2000.
Bensley, E., Thuraisingham, B., et al., Design and Implementation of an Infrastructure and Data Management for Evolvable Real-time Command and Control Systems, proceedings IEEE WORDS, Laguna beach, CA, February 1996.
Bertino, E., E. Ferrari, et al, Access Control for XML Documents, Data and Knowledge Engineering, 2002.
Bertino, E., B. Carminati, E. Ferrari, et al, Secure Third Party Publication of XML Documents, Accepted for publication in IEEE Transactions on Knowledge and Data Engineering, 2003.
Proceedings of the National Computer Security Conference, Developments in Database Security, by Dr. John Campbell, 1990.
Clifton, C. and D. Marks, “Security and Privacy Implications of Data Mining”, Proceedings of the ACM SIGMOD Conference Workshop on Research Issues in Data Mining and Knowledge Discovery, Montreal, June 1996.
Clifton, C., M. Kantarcioglu and J. Vaidya, “Defining Privacy for Data Mining,” Purdue University, 2002 (see also Next Generation Data Mining Workshop, Baltimore, MD, November 2002).
Evfimievski, A., R. Srikant, R. Agrawal, and J. Gehrke, “Privacy Preserving Mining of Association Rules,” In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada, July 2002.
Farkas, C., Inference Problem for the Semantic Web, Proceedings of the IFIP Conference on Data and Applications Security, Colorado, August 2003.
Ferrari E., and B. Thuraisingham, “Secure Database Systems,” in Advances in Database Management by Artech House, 2000 (Editors: M. Piattini, O. Diaz).
Ferrari, E., and B. Thuraisingham, “Security and Privacy for Web Databases and Web Services,” Proceedings of the EDBT Conference, Crete, March 2004.
Gehrke, J., “Research Problems in Data Stream Processing and Privacy-Preserving Data Mining,” Proceedings of the Next Generation Data Mining Workshop, Baltimore, MD, November 2002.
Hinke T., “Inference and Aggregation Detection in Database Management Systems,” Proceedings of the Security and Privacy Conference, Oakland, CA, April 1988.
Jajodia, S., et al, “Release Control in Documents,” Proceedings of the IFIP Database Integrity and Control Conference, Lausanne, Switzerland, November 2003.
Berners Lee, T., et al., “The Semantic Web,” Scientific American, May 2001.
Morgenstern, M., “Security and Inference in Multilevel Database and Knowledge Base Systems,” Proceedings of the ACM SIGMOD Conference, San Francisco, CA, June 1987.
Cyber Trust Theme, National Science Foundation, http://www.nsf.gov/pubsys/ods/getpub.cfm?odskey=nsf04524
A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” CMU Report, 2003.
Thuraisingham, B., “Multilevel Security for Relational Database Systems Augmented by an Inference Engine,” Computers and Security, December 1987.
Thuraisingham, B., W. Ford and M. Collins, “Design and Implementation of a Database Inference Controller,” Data and Knowledge Engineering Journal, December 1993.
Thuraisingham B. and W. Ford, “Security Constraint Processing in a Distributed Database Management System,” IEEE Transactions on Knowledge and Data Engineering, 1995.
Thuraisingham, B., “Data Mining: Technologies, Techniques, Tools and Trends,” CRC Press, 1998.
Thuraisingham, B. and J. Maurer, “Information Survivability for Real-time Command sand Control Systems,” IEEE Transactions on Knowledge and Data Engineering, January 1999.
Thuraisingham, B., “Data and Applications Security: Developments and Directions,” Proceedings of the IEEE COMPSAC Conference, Oxford, UK, August 2002.
Thuraisingham, B., “Data and Applications Security: Developments and Directions,” Keynote Presentation, IFIP 11.3 Conference on Data and Applications Security, Estes Park, Colorado, August 3, 2003.
Thuraisingham, B., “Security and Privacy for Sensor Databases,” Accepted for publication in Sensor Letters, 2003.
Thuraisingham, B., “Privacy Constraint Processing in a Privacy Enhanced Database System,” Accepted for publication in Data and Knowledge Engineering Journal, 2003.
Thuraisingham, B., “Semantic Data Modeling for Privacy Control in Databases,” Submitted for Publication, 2003.
Thuraisingham, B., “On the Unsolvability of the Privacy Problem in Databases,” Submitted for Publication, 2003.
Thuraisingham, B., “Privacy-Preserving Data Mining: Developments and Directions” Accepted for publication in Journal of Database Management, Journal, 2003.
Thuraisingham, B., “Web Data Mining and Applications in Business Intelligence and Counter-terrorism, CRC Press,” June 2003.
Thuraisingham, B., “Database and Applications Security: Integrating Databases and Information Security,” CRC Press, to appear, 2004.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Thuraisingham, B. (2004). Data and Applications Security: Past, Present and the Future. In: De Capitani di Vimercati, S., Ray, I., Ray, I. (eds) Data and Applications Security XVII. IFIP International Federation for Information Processing, vol 142. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8070-0_27
Download citation
DOI: https://doi.org/10.1007/1-4020-8070-0_27
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8069-2
Online ISBN: 978-1-4020-8070-8
eBook Packages: Springer Book Archive