We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 108 results
  1. Erratum to: Database and Application Security XV

    Erratum to: M.S. Olivier and D.L. Spooner (Eds.) Database and Application Security XV DOI:...
    Martin S. Olivier, David L. Spooner in Database and Application Security XV
    Chapter 2017
  2. A Novel Approach to Certificate Revocation Management

    With the ever-increasing growth in electronic messaging and electronic commerce, the need for an infrastructure to provide confidentiality, security,...
    Ravi Mukkamala, Sushil Jajodia in Database and Application Security XV
    Chapter 2002
  3. Regulating Access to XML Documents

    In this paper, our objective is to define a security model for regulating access to XML documents. Our model offers a security policy with a great...
    Alban Gabillon, Emmanuel Bruno in Database and Application Security XV
    Chapter 2002
  4. Administering Permissions for Distributed Data: Factoring and Automated Inference

    We extend SQL’s grant/revoke model to handle all administration of permissions in a distributed database. The key idea is to “factor” permissions...
    Arnon Rosenthal, Edward Sciore in Database and Application Security XV
    Chapter 2002
  5. Efficient Damage Assessment and Repair in Resilient Distributed Database Systems

    Preventive measures sometimes fail to defect malicious attacks. With cyber attacks on data-intensive applications becoming an ever more serious...
    Chapter 2002
  6. Randomly Roving Agents for Intrusion Detection

    Agent based intrusion detection systems (IDS) have advantages such as scalability, reconfigurability, and survivability. In this paper, we I ntroduce...
    Ira S. Moskowitz, Myong H. Kang, ... Garth E. Longdon in Database and Application Security XV
    Chapter 2002
  7. Security Procedures for Classification Mining Algorithms

    Classification mining algorithms can be used to discover protected values from non-protected data that are voluntarily released for mining purposes....
    Tom Johnsten, Vijay V. Raghavan in Database and Application Security XV
    Chapter 2002
  8. Recent Advances in Access Control Models

    Advances in application areas bring new dimensions to access control needs. This paper discusses several access control models that have been...
    Sushil Jajodia, Duminda Wijesekera in Database and Application Security XV
    Chapter 2002
  9. Reorganization of the Database Log for Information Warfare Data Recovery

    Using traditional logs that contain only before and after images of data items and record neither any of the read operations nor actual mathematical...
    Rumman Sobhan, Brajendra Panda in Database and Application Security XV
    Chapter 2002
  10. Database and Application Security XV IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

    Database and Application Security XVprovides a forum for original research results, practical experiences, and innovative ideas in database and...

    Martin S. Olivier, David L. Spooner in IFIP Advances in Information and Communication Technology
    Book 2002
  11. Constraints-Based Access Control

    The most important aspect of security in a database after establishing the authenticity of the user is its access control mechanism. The ability of...
    Chapter 2002
  12. State-Dependent Security Decisions for Distributed Object-Systems

    Distributed systems consist of many different objects, participating in distributed activity sequences. We present a system for state-dependent...
    Joachim Biskup, Thomas Leineweber in Database and Application Security XV
    Chapter 2002
  13. The Inference Problem and Updates in Relational Databases

    In this paper, we extend the Disclosure Monitor (DiMon) security mechanism (Brodsky et al. [1]) to prevent illegal inferences via database...
    Csilla Farkas, Tyrone S. Toland, Caroline M. Eastman in Database and Application Security XV
    Chapter 2002
  14. Selected Summary of Discussions

    David L. Spooner, Martin S. Olivier in Database and Application Security XV
    Chapter 2002
  15. Panel on XML and Security

    The panelists were asked to address the question: “XML security: are all the problems solved?” As we can see from the following sections, a large...
    Sylvia Osborn, Bhavani Thuraisingham, Pierangela Samarati in Database and Application Security XV
    Chapter 2002
  16. A Comparison Between ConSA and Current Linux Security Implementations

    There are many extensions to the Linux security model that are available. ConSA [1] aims to provide a configurable architecture, and should allow...
    Alexandre Hardy, Martin S. Olivier in Database and Application Security XV
    Chapter 2002
  17. Public Telephone Network Vulnerabilities

    The convergence of public telephone networks (PTNs), wireless networks and the Internet makes it possible to disrupt vital information and...
    G. Lorenz, J. Keller, ... S. Shenoi in Database and Application Security XV
    Chapter 2002
  18. Flexible Security Policies in SQL

    We show how a wide variety of role-based access control policies may be formally specified in the stratified subset of clause form logic. We then...
    Steve Barker, Arson Rosenthal in Database and Application Security XV
    Chapter 2002
  19. ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications

    This paper presents the design and implementation of an on-the-fly damage assessment and repair tool for intrusion tolerant commercial database...
    Pramote Luenam, Peng Liu in Database and Application Security XV
    Chapter 2002
  20. Role-Based Access Control on the Web Using LDAP

    This paper gives a framework for how to leverage Lightweight Directory Access Protocol (LDAP) to implement Role-based Access Control (RBAC) on the...
    Joon S. Park, Gail-Joon Ahn, Ravi Sandhu in Database and Application Security XV
    Chapter 2002
Did you find what you were looking for? Share feedback.