logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Research Advances in Database and Information Systems Security: Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security July 25-28, 1999,

Research Advances in Database and Information Systems Security: Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, (Hardcover, 2000)

John Hale (지은이)
Kluwer Academic Pub
214,970원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
176,270원 -18% 0원
8,820원
167,450원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Research Advances in Database and Information Systems Security: Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security July 25-28, 1999,
eBook 미리보기

책 정보

· 제목 : Research Advances in Database and Information Systems Security: Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, (Hardcover, 2000) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780792378488
· 쪽수 : 334쪽
· 출판일 : 2000-05-31

목차

List of Figures. List of Tables. Preface. Contributing Authors. Part I: Intrusion Detection. 1. Intrusion Confinement by Isolation in Information Systems; P. Liu, et al. 2. Analyzing the Performance of Program Behavior Profiling for Intrusion Detection; A.K. Ghosh, A. Schwartzbard. 3. Integrating Data Mining Techniques with Intrusion Detection Methods; R. Mukkamala, et al. Part II: Role-Based Access Control. 4. RBAC on the Web by Secure Cookies; J.S. Park, et al. 5. eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features; I. Mavridis, et al. 6. Software Agents for Role Based Security; S. Demurjian, et al. Part III: Critical Infrastructure Protection Panel. 7. Selected Topics in Infrastructure and Information Assurance; W.V. Maconachu, et al. Part IV: Policy/Modeling. 8. A Secret Splitting Method for Assuring the Confidentiality of Electronic Records; A.P.-J. Ho. 9. For Unknown Secrecies Refusal is Better than Lying; J. Biskup. Part V: Workflow Systems. 10. Extending The BFA Workflow Authorization Model to Express Weighted Voting; S. Kandala, R. Sandhu. 11. A Strategy for an MLS Workflow Management System; M.H. Kang, et al. Part VI: Data Mining/Data Warehousing. 12. Impact of Decision-Region Based Classification Mining Algorithms on Database Security; T. Johnsten, V.V. Raghavan. 13. Protecting Against Data Mining through Samples; C. Clifton. 14. Security Administration for Federations, Warehouses, and other Derived Data; A. Rosenthal, et al. Part VII: Intrusion Detection Panel. 15. Panel on Intrusion Detection; TC Ting, et al. Part VIII: Multilevel Security. 16. Enforcing Integrity While Maintaining Secrecy; D.G. Marks. Part IX: Temporal Authorization Models. 18. Temporal Authorization in the Simplified Event Calculus; S. Barker. 19. Specifying and Computing Hierarchies of Temporal Authorizations; E. Bertino, et al. Part X: Object-Oriented Databases. 20. The Security Problem against Inference Attacks on Object-Oriented Databases; Y. Ishihara, et al. 21. A Logical Formalization for Specifying Authorizations in Object-Oriented Databases; Y. Bai, V. Varadharajan. Index.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책