Sold Out
Book Categories |
Preface | ||
Recent Advances in Access Control Models | 3 | |
Role-based Access Control on the Web Using LDAP | 19 | |
Constraints-based Access Control | 31 | |
Secure Role-Based Workflow Models | 45 | |
Subject Switching Algorithms for Access Control in Federated Databases | 61 | |
Efficient Damage Assessment and Repair in Resilient Distributed Database Systems | 75 | |
Administering Permissions for Distributed Data: Factoring and Automated Inference | 91 | |
State-Dependent Security Decisions for Distributed Object-Systems | 105 | |
Reorganization of Database Log for Information Warfare Data Recovery | 121 | |
Randomly roving agents for intrusion detection | 135 | |
Public Telephone Network Vulnerabilities | 151 | |
Flexible Security Policies in SQL | 167 | |
The Inference Problem and Updates in Relational Databases | 181 | |
Managing Classified Documents in a Relational Database | 195 | |
A Comparison Between ConSA and Current Linux Security Implementations | 211 | |
A Novel Approach to Certificate Revocation Management | 225 | |
ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications | 239 | |
An Extended Transaction Model Approach for Multilevel Secure Transaction Processing | 255 | |
Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System | 269 | |
Security Procedures for Classification Mining Algorithms | 285 | |
Regulating Access to XML documents | 299 | |
Panel on XML and Security | 317 | |
Selected Summary of Discussions | 325 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionDatabase And Application Security Xv
X
This Item is in Your InventoryDatabase And Application Security Xv
X
You must be logged in to review the productsX
X
X
Add Database And Application Security Xv, Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, s, Database And Application Security Xv to the inventory that you are selling on WonderClubX
X
Add Database And Application Security Xv, Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security. With the rapid growth of large databases and the application systems that manage them, s, Database And Application Security Xv to your collection on WonderClub |