This book provides an authoritative account of security issues in database systems, and shows how current commercial or future systems may be designed to ensure both integrity and confidentiality. It gives a full account of alternative security models and protection measures. This invaluable reference can be used as a text for advanced courses on DB security.
This book is about database security and auditing.
This book aims to discuss in depth the current state of research and practice in database security.
This volume is also suitable for advanced-level students in computer science interested in the state-of-the-art in data security.
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications.
14.2.4 Metadata Security in Mobile Database Management and Access As mentioned above, there is a security threat because of different trust levels of the base stations. In database environments, we have to extend our attention on the ...
Proc. of The IEEE Computer Society Symposium on Security and Privacy, Oakland, pp.110-115. Jonscher, D. and Dittrich, K.R. (1994) An Approach For Building Secure Database Federations. Proc. of the Int. Conf. on Very Large Database, ...
In S. Jajodia and C. E. Landwehr, editors, Database Security, IV: Status and Prospects, pages 265–79. North-Holland, 1991. H. H. Hosmer. Integrating security policies. In Proceedings of the Third RADC Database Security Workshop, ...
Security Models for Different Data Models • Most work in database security has restricted itself to the databases constructed according the relational data model, both because of its popularity and because of the well-developed theory ...
IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada Martin S. Olivier, David L. Spooner ...
This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture.