Error title
Some error text about your books and stuff.
Close

Research Advances in Database and Information Systems Security Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security, July 25-28, 1999,

by John Hale

  • ISBN: 9780792378488
  • ISBN10: 0792378482

Research Advances in Database and Information Systems Security Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security, July 25-28, 1999,

by John Hale

  • List Price: $179.00
  • Binding: Hardcover
  • Publisher: Kluwer Academic Pub
  • Publish date: 05/01/2000
  • ISBN: 9780792378488
  • ISBN10: 0792378482
used Add to Cart $16.95
You save: 91%
Marketplace Item
Product notice Returnable at the third party seller's discretion and may come without consumable supplements like access codes, CD's, or workbooks.
new Add to Cart $102.32
You save: 43%
FREE economy shipping!
Description: I Intrusion Detection.- 1 Intrusion Confinement by Isolation in Information Systems.- 2 Analyzing the Performance of Program Behavior Profiling for Intrusion Detection.- 3 Integrating Data Mining Techniques with Intrusion Detection Methods.- II Role-Based Access Control.- 4 RBAC on the Web by Secure Cookies.- 5 eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features.- 6 Software Agents for Role Based Security.- III Critical Infrastructure Protection Panel.- 7 Selected Topics in Infrastructure and Information Assurance.- IV Policy/Modeling.- 8 A Secret Splitting Method for Assuring the Confidentiality of Electronic Records.- 9 For Unknown Secrecies Refusal is Better than Lying.- V Workflow Systems.- 10 Extending The BFA Workflow Authorization Model to Express Weighted Voting.- 11 A Strategy for an MLS Workflow Management System.- VI Data Mining/Data Warehousing.- 12 Impact of Decision-Region Based Classification Mining Algorithms on Database Security.- 13 Protecting Against Data Mining through Samples.- 14 Security Administration for Federations, Warehouses, and other Derived Data.- VII Intrusion Detection Panel.- 15 Panel on Intrusion Detection.- VIII Multilevel Security.- 16 Enforcing Integrity While Maintaining Secrecy.- 17 The Effect of Confidentiality on the Structure of Databases.- IX Temporal Authorization Models.- 18 Temporal Authorization in the Simplified Event Calculus.- 19 Specifying and Computing Hierarchies of Temporal Authorizations.- X Object-Oriented Databases.- 20 The Security Problem against Inference Attacks on Object-Oriented Databases.- 21 A Logical Formalization for Specifying Authorizations in Object-Oriented Databases.
Expand description
Product notice Returnable at the third party seller's discretion and may come without consumable supplements like access codes, CD's, or workbooks.
Seller Condition Comments Price  
Seller: GuthrieBooks
Location: Spring Branch, TX
Condition: Very Good
Shipping Icon
Size: 7x1x8; Ex-Library hardcover in very nice condition with all the usual markings and attachments. Text block clean and unmarked. Tight binding.
Price:
$16.95
Comments:
Size: 7x1x8; Ex-Library hardcover in very nice condition with all the usual markings and attachments. Text block clean and unmarked. Tight binding.
Seller: Scholars Attic
Location: Lake Barrington, IL
Condition: New
Sewn binding. Cloth over boards. 364 p. Contains: Illustrations. International Federation for Information Processing, 43. Audience: General/trade.
Price:
$18.00
Comments:
Sewn binding. Cloth over boards. 364 p. Contains: Illustrations. International Federation for Information Processing, 43. Audience: General/trade.
Seller: Ergodebooks
Location: White Haven, PA Ask seller a question
Condition: Good
Buy with confidence. Excellent Customer Service & Return policy.
Price:
$21.90
Comments:
Buy with confidence. Excellent Customer Service & Return policy.
please wait
Please Wait

Notify Me When Available

Enter your email address below,
and we'll contact you when your school adds course materials for
.
Enter your email address below, and we'll contact you when is back in stock (ISBN: ).