Search
Search Results
-
Erratum to: Database and Application Security XV
Erratum to: M.S. Olivier and D.L. Spooner (Eds.) Database and Application Security XV DOI:... -
A Novel Approach to Certificate Revocation Management
With the ever-increasing growth in electronic messaging and electronic commerce, the need for an infrastructure to provide confidentiality, security,... -
Regulating Access to XML Documents
In this paper, our objective is to define a security model for regulating access to XML documents. Our model offers a security policy with a great... -
Administering Permissions for Distributed Data: Factoring and Automated Inference
We extend SQL’s grant/revoke model to handle all administration of permissions in a distributed database. The key idea is to “factor” permissions... -
Efficient Damage Assessment and Repair in Resilient Distributed Database Systems
Preventive measures sometimes fail to defect malicious attacks. With cyber attacks on data-intensive applications becoming an ever more serious... -
Randomly Roving Agents for Intrusion Detection
Agent based intrusion detection systems (IDS) have advantages such as scalability, reconfigurability, and survivability. In this paper, we I ntroduce... -
Security Procedures for Classification Mining Algorithms
Classification mining algorithms can be used to discover protected values from non-protected data that are voluntarily released for mining purposes.... -
Recent Advances in Access Control Models
Advances in application areas bring new dimensions to access control needs. This paper discusses several access control models that have been... -
Reorganization of the Database Log for Information Warfare Data Recovery
Using traditional logs that contain only before and after images of data items and record neither any of the read operations nor actual mathematical... -
Database and Application Security XV IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada
Database and Application Security XVprovides a forum for original research results, practical experiences, and innovative ideas in database and...
-
Constraints-Based Access Control
The most important aspect of security in a database after establishing the authenticity of the user is its access control mechanism. The ability of... -
State-Dependent Security Decisions for Distributed Object-Systems
Distributed systems consist of many different objects, participating in distributed activity sequences. We present a system for state-dependent... -
The Inference Problem and Updates in Relational Databases
In this paper, we extend the Disclosure Monitor (DiMon) security mechanism (Brodsky et al. [1]) to prevent illegal inferences via database... -
-
Panel on XML and Security
The panelists were asked to address the question: “XML security: are all the problems solved?” As we can see from the following sections, a large... -
A Comparison Between ConSA and Current Linux Security Implementations
There are many extensions to the Linux security model that are available. ConSA [1] aims to provide a configurable architecture, and should allow... -
Public Telephone Network Vulnerabilities
The convergence of public telephone networks (PTNs), wireless networks and the Internet makes it possible to disrupt vital information and... -
Flexible Security Policies in SQL
We show how a wide variety of role-based access control policies may be formally specified in the stratified subset of clause form logic. We then... -
ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications
This paper presents the design and implementation of an on-the-fly damage assessment and repair tool for intrusion tolerant commercial database... -
Role-Based Access Control on the Web Using LDAP
This paper gives a framework for how to leverage Lightweight Directory Access Protocol (LDAP) to implement Role-based Access Control (RBAC) on the...