Database Security XII : Status and Prospects (Ifip Advances in Information and Communication Technology)

個数:
  • ポイントキャンペーン

Database Security XII : Status and Prospects (Ifip Advances in Information and Communication Technology)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 296 p.
  • 言語 ENG
  • 商品コード 9781475749144
  • DDC分類 003

Full Description

New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society.
Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including:

Electronic Commerce
Informational Assurances
Workflow
Privacy
Policy Modeling
Mediation
Information Warfare Defense
Multilevel Security
Role-based Access Controls
Mobile Databases
Inference
Data Warehouses and Data Mining.


This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece.
Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.

Contents

I Invited Talks.- 1 E-Commerce Security: No Silver Bullet.- 2 Technical Enforcement of Informational Assurances.- II Workflow.- 3 Analyzing the Safety of Workflow Authorization Models.- 4 Rules and Patterns for Security in Workflow Systems.- III Privacy.- 5 An information-flow model for Privacy (InfoPriv).- IV Policy Modeling.- 6 Security Policies in Replicated and Autonomous Databases.- 7 Programmable Security for Object-Oriented Systems.- V Mediation.- 8 Secure Mediation: Requirements and Design.- VI Information Warfare Defense.- 9 Reconstructing the Database after Electronic Attacks.- VII Multilevel Security.- 10 Version Management in the STAR MLS Database System.- 11 SACADDOS: a support tool to manage multilevel documents.- VIII Role-based Access Controls.- 12 Using Role-Templates for Handling Recurring Role Structures.- 13 Role Based Security and Java.- IX Mobile Databases.- 14 Security Issues in Mobile Database Access.- X Inference.- 15 Bayesian Methods Applied to the Database Inference Problem.- 16 The Design and Implementation of a Data Level Database Inference Detection System.- XI Pane.- 17 Security and Privacy Issues for the World Wide Web: Panel Discussion.- XII Discussion Summary.- 18 Workshop Summary.

最近チェックした商品