Skip to main content

Abstract

The past two decades have witnessed a phenomenal growth in distributed and multiuser computing and connectivity. Usage of computers to process sensitive and crucial information in governmental, military, as well as commercial sectors has been increasing considerably. Every activity in both public and private organizations is today depending on the correctness, availability, and secrecy of the information stored or processed within a computer system or transmitted over a network. New technological developments and increased automation of business processes are contributing towards a more efficient and powerful way of managing and accessing such large quantity of data. These include the proliferation of the Internet and the World Wide Web, the introduction of electronic commerce and digital libraries, and the application of workflow systems. At the same time, however, this “evolution” has also increased both the vulnerability of systems to security violations and the damage that such violations may cause. Consequently, security issues are today of great concern to both researchers and practitioners involved with data management. As a complicating aspect, new technologies have also introduced new security requirements and new research challenges that have not been addressed before. Reacting to this increasing need for security, researchers and developers have contributed significantly to advancements in the theory, design, implementation, analysis, and application of secure computer systems and networks. This special issue on security of the Distributed and Parallel Databases: An International Journal, comprising of four research papers, is an attempt to provide a insight into this research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer Science+Business Media New York

About this chapter

Cite this chapter

Atluri, V., Samarati, P. (2000). Guest Editor’s Introduction. In: Atluri, V., Samarati, P. (eds) Security of Data and Transaction Processing. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-4461-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-4461-6_1

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-7009-3

  • Online ISBN: 978-1-4615-4461-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics