MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Database security / Silvana Castano ... [et al.].

Contributor(s): Castano, Silvana.
Material type: materialTypeLabelBookSeries: ACM Press books.Publisher: [New York] : Wokingham, England ; Reading, Mass. : ACM Press ; Addison-Wesley, 1995Description: xix, 456 p. : ill. ; 24 cm.ISBN: 0201593750.Uniform titles: Sicurezza del basi di dati. English. Subject(s): Database securityDDC classification: 005.8
Contents:
Information security -- Security models -- Basic security mechanisms and software -- Database security design -- Statistical database security -- Intrusion detection -- Security models for next-generation databases.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00009529
Total holds: 0

Enhanced descriptions from Syndetics:

The competitative edge of many companies and public trust in government institutions can often depend on the security of the information now held in databases. Breaches of that security are a highly topical issue for designers and users of database systems. This book provides an account of security issues in computer systems and shows how current commercial or future systems may be designed to ensure both integrity and confidentiality. It provides a full account of alternative security issues in database models and protection measures, including those for new-generation systems like distributed, frame-based and object-oriented databases.

Includes bibliographical references and index.

Information security -- Security models -- Basic security mechanisms and software -- Database security design -- Statistical database security -- Intrusion detection -- Security models for next-generation databases.

Translation of: Sicurezza del basi di dati.

Table of contents provided by Syndetics

  • Information Security
  • Introduction
  • Introduction to Databases Security
  • Problems in Databases Security Controls Conclusions
  • Security Models
  • Introduction Access
  • Matrix Model
  • Take-Grant Model
  • Acten Model PN Model
  • Hartson and Hsiao's Model
  • Fernandez's Model
  • Bussolati and Martella's Model for Distributed databases
  • Bell and LaPadula's Model
  • Biba's Model
  • Dion's Model
  • Sea View Model
  • Jajodia and Sandhu's Model
  • The Lattice Model for the Flow Control conclusion
  • Security Mechanisms
  • Introduction User Identification/Authentication
  • Memory Protection
  • Resource Protection
  • Control Flow Mechanisms
  • Isolation Security Functionalities in Some Operating Systems
  • Trusted Computer System Evaluation Criteria
  • Security Software Design
  • Introduction A Methodological Approach to Security
  • Software Design Secure
  • Operating System Design Secure
  • DBMS Design Security Packages
  • Database Security Design
  • Statistical Database Protection
  • Introduction Statistics Concepts and Definitions
  • Types of Attacks Inference Controls evaluation
  • Criteria for Control Comparison
  • Intrusion Detection Systems
  • Introduction IDES System RETISS System ASES System Discovery
  • Models For The Protection Of New Generation Database Systems
  • Introduction A Model for the Protection of Frame Based Systems
  • A Model for the Protection of Object-Oriented Systems
  • SORION Model for the Protection of Object-Oriented
  • Databases a Model for the Protection of New Generation
  • Database Systems: the Orion Model Jajodia and Kogan's Model
  • A Model for the Protection of Active Databases
  • Conclusions

Powered by Koha