logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Database and Applications Security : Integrating Information Security and Data Management

Database and Applications Security : Integrating Information Security and Data Management (Hardcover)

Bhavani M. Thuraisingham (지은이)
Auerbach Pub
296,870원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
243,430원 -18% 0원
12,180원
231,250원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Database and Applications Security : Integrating Information Security and Data Management
eBook 미리보기

책 정보

· 제목 : Database and Applications Security : Integrating Information Security and Data Management (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780849322242
· 쪽수 : 656쪽
· 출판일 : 2005-05-26

목차

Foreword -- Preface -- Acknowledgments -- About the Author -- 1 Introduction -- 1.1 Trends -- 1.2 Supporting Technologies for Database and Applications Security -- 1.3 Discretionary Security in Database Systems -- 1.4 Multilevel Secure Data Management -- 1.5 Multilevel Secure Relational Data Models and Systems -- 1.6 Inference Problem -- 1. 7 Secure Distributed Database Systems -- 1.8 Secure Object and Multimedia Data Systems -- 1.9 Data Warehousing, Data Mining, Security, and Privacy -- 1.10 Secure Web Information Management Technologies -- 1.11 Emerging Secure Information Management Technologies -- 1.12 Organization of This Book -- 1.13 Next Steps -- PART 1: SUPPORTING TECHNOLOGIES -- FOR DATABASE AND APPLICATIONS SECURITY -- 2 Data Management Technologies -- 2.1 Overview -- 2.2 Relational and Entity-Relationship Data Models -- 2.2.1 Overview -- 2.2.2 Relational Data Model -- 2.2.3 Entity-Relationship Data Model -- 2.3 Architectural Issues -- 2.4 Database Design -- 2.5 Database Administration -- 2.6 Database Management System Functions -- 2.6.1 Overview -- 2.6.2 Query Processing -- 2.6.3 Transaction Management -- 2.6.4 Storage Management -- 2.6.5 Metadata Management -- 2.6.6 Database Integrity -- 2.6.7 Fault Tolerance -- 2.6.8 Other Functions -- 2.7 Distributed Databases -- 2.8 Heterogeneous Database Integration -- 2.9 Federated Databases -- 2.10 Client/Server Databases -- 2.11 Migrating Legacy Databases and Applications -- 2.12 Data Warehousing -- 2.13 Data Mining -- 2.14 Impact of the Web -- 2.15 Object Technology -- 2.15.1 Overview -- 2.15.2 Object Data Model -- 2.15.3 Other Object Technologies -- 2.16 Other Database Systems -- 2.17 Summary and Directions -- References -- Exercises -- 3 Information Security -- 3.1 Overview -- 3.2 Access Control and Other Security Concepts -- 3.3 Secure Systems -- 3.4 Secure Operating Systems -- 3.5 Secure Database Systems -- 3.6 Secure Networks -- 3.7 Emerging Trends -- 3.8 Impact of the Web -- 3.9 Steps to Building Secure Systems -- 3.10 Summary and Directions -- References -- Exercises -- 4 Information Management Technologies -- 4.1 Overview -- 4.2 Information Retrieval Systems -- 4.2.1 Text Retrieval -- 4.2.2 Image Retrieval -- 4.2.3 Video Retrieval -- 4.2.4 Audio Retrieval -- 4.3 Multimedia Data and Information Management -- 4.4 Digital Libraries -- 4.4.1 Overview -- 4.4.2 Web Database Management -- 4.4.3 Markup Languages -- 4.4.4 Search Engines -- 4.4.5 Question-Answering Systems -- 4.5 Knowledge Management -- 4.6 Collaboration and Data Management -- 4.7 E-Commerce Technologies -- 4.8 Semantic Web Technologies -- 4.9 Wireless and Sensor Information Management -- 4.10 Real-Time Processing and Quality-of-Service Aspects -- 4.11 High-Performance Computing Technologies -- 4.12 Some Other Information Management Technologies -- 4.12.1 Overview -- 4.12.2 Visualization -- 4.12.3 Decision Support -- 4.12.4 Agents -- 4.12.5 Peer-to-Peer Data Management -- 4.13 Summary and Directions -- References -- Exercises -- Conclusion to Part I -- PART II: DISCRETIONARY SECURITY -- FOR DATABASE SYSTEMS -- 5 Security Policies -- 5.1 Overview -- 5.2 Access-Control Policies -- 5.2.1 Overview -- 5.2.2 Authorization Policies -- 5.2.3 Role-Based Access Control -- 5.3 Administration Policies -- 5.4 Identification and Authentication -- 5.5 Auditing a Database System -- 5.6 Views for Security -- 5.7 Summary and Directions -- References -- Exercises -- 6 Policy Enforcement and Related Issues -- 6.1 Overview -- 6.2 SQL Extensions for Security -- 6.3 Query Modification -- 6.4 Discretionary Security and Database Functions -- 6.5 Visualization of Policies -- 6.6 Prototypes and Products -- 6.7 Summary and Directions -- References -- Exercises -- Conclusion to Part ll -- PART Ill: MANDATORY SECURITY -- FOR OAT ABASE SYSTEMS -- 7 Historical Developments -- 7.1 Overview -- 7.2 Early Efforts -- 7.3 Air Force Summer Study -- 7.4 Major Research and Development Efforts -- 7.5 Trusted Database Interpretation -- 7.6 Types of Multilevel Secure Database Systems -- 7.6.1 Overview -- 7.6.2 Relational Database Systems -- 7.6.3 Entity-Relationship Systems -- 7.6.4 Object Database Systems -- 7.6.5 Distributed and Heterogeneous Database Systems -- 7.6.6 Deductive Database Systems -- 7.6.7 Functional Database Systems -- 7.6.8 Parallel Database Systems -- 7.6.9 Real-Time Database Systems -- 7.7 Hard Problems -- 7.8 Emerging Technologies -- 7.9 Summary and Directions -- References -- Exercises -- 8 Design Principles -- 8.1 Overview -- 8.2 Mandatory Access Control -- 8.2.1 Overview -- 8.2.2 Mandatory Access-Control Policies -- 8.3 Security Architectures -- 8.3.1 Overview -- 8.3.2 Integrity Lock -- 8.3.3 Operating System Providing Access Control -- 8.3.4 Kernel Extensions Architecture -- 8.3.5 Trusted Subject Architecture -- 8.3.6 Distributed Architecture -- 8.4 Summary and Directions -- References -- Exercises -- Conclusion to Part m -- PART IV: MULTILEVEL SECURE RELATIONAL -- OAT ABASE SYSTEMS -- 9 Multilevel Relational Data Models -- 9.1 Overview -- 9.2 Granularity of Classification -- 9.3 Polyinstantiation -- 9.4 Toward Developing a Standard Multilevel Relational -- Data Model -- 9.5 Summary and Directions -- References -- Exercises -- 1 0 Security Impact on Database Functions -- 10.1 Overview -- 10.2 Query Processing -- 10.3 Transaction Processing -- 10.4 Storage Management -- 10.5 Metadata Management -- 10.6 Other Functions -- 10.7 Summary and Directions -- References -- Exercises -- 11 Prototypes and Products -- 11.1 Overview -- 11.2 Prototypes -- 11.2.1 Overview -- 11.2.2 Discussion of Prototypes -- 11.2.2.1 Hinke-Schaefer -- 11.2.2.2 Naval Surveillance Model -- 11.2.2.3 Integrity Lock Prototypes -- 11.2.2.4 SeaView -- 11.2.2.5 Lock Data Views -- 11.2.2.6 ASD and ASD-Views -- 11.2.2.7 SINTRA and SDDBMS -- 11.2.2.8 SWORD -- 11.3 Products -- 11.3.1 Overview -- 11.3.2 Discussion of Products -- 11.3.2.1 TRUDATA -- 11.3.2.2 Sybase Secure SQL Server -- 11.3.2.3 Trusted Oracle -- 11.3.2.4 Trusted Informix -- 11.3.2.5 Trusted Rubix -- 11.3.2.6 SERdb -- 11.3.2.7 Secure Teradata Machine -- 11.3.2.8 INGRES -- 11.4 Summary and Directions -- References -- Exercises -- Conclusion to Part IV -- PART V: THE INFERENCE PROBLEM -- 12 A Perspective of the Inference Problem -- 12.1 Overview -- 12.2 Statistical Database Inference -- 12.3 Discussion of Approaches for Handling Inference -- in a MLS/DBMS -- 12.4 Complexity of the Inference Problem -- 12.5 Summary and Directions -- References -- Exercises -- 13 Security-Constraint Processing for Inference Control -- 13.1 Overview -- 13.2 Background -- 13.3 Security Constraints -- 13.3.1 Simple Constraints -- 13.3.2 Content-Based Constraints -- 13.3.3 Association-Based Constraints (also Called Context -- or Together Constraints) -- 13.3.4 Event-Based Constraints -- 13.3.5 General Release-Based Constraints -- 13.3.6 Individual Release-Based Constraints -- 13.3.7 Aggregate Constraints -- 13.3.8 Logical Constraints -- 13.3.9 Constraints with Conditions -- 13.3.10 Other Constraints -- 13.3.11 Level-Based Constraints -- 13.3.12 Fuzzy Constraints -- 13.3.13 Complex Constraints -- 13.4 Approach to Security Constraint Processing -- 13.5 Consistency and Completeness of the Constraints -- 13.5.1 Algorithm A: Consistency and Completeness Checker -- 13.6 Design of the Query Processor -- 13.6.1 Security Policy -- 13.6.2 Functionality of the Query Processor -- 13.6.2.1 Query Modification -- 13.6.2.2 Response Processing -- 13.7 Design of the Update Processor -- 13.7.1 Security Policy -- 13.7.2 Functionality of the Update Processor -- 13.8 Handling Security Constraints During Database Design -- 13.8.1 Overview -- 13.9 Security Control Processing and Release Control -- 13.10 Summary and Directions -- References -- Exercises -- 14 Conceptual Structures for Inference Control -- 14.1 Overview -- 14.2 Semantic Nets and the Inference Problem -- 14.2.1 Overview -- 14.2.2 Multilevel Semantic Nets -- 14.2.3 Reasoning with Multilevel Semantic Nets -- 14.2.3.1 Implicit Information -- 14.2.4 Conditional Statements and Auxiliary Nets -- 14.2.5 Enforcing Security Constraints -- 14.2.6 Universal and Existential Conditionals -- 14.2.7 Semantics -- 14.2.7.1 Multilevel Worlds -- 14.2.7.2 Interpretations -- 14.2.7.3 Ground Vectors -- 14.2.7.4 Ground Conditionals -- 14.2.7.5 Universal Conditionals -- 14.2.7.6 Existential Conditionals -- 14.2.8 Refutations -- 4.3 Summary and Directions -- References -- Exercises -- Conclusion to Part V -- PART VI: SECURE DISTRIBUTED AND -- HETEROGENEOUS DATABASE SYSTEMS -- 15 Discretionary Security for Distributed Database Systems -- 15.1 Overview -- 15.2 Discretionary Security -- 15.2.1 Overview -- 15.2.2 Access-Control Policies -- 15.2.2.1 Distributed Access Control -- 15.2.2.2 Role-Based Access Control -- 15.2.3 Identification and Authentication -- 15.2.4 Auditing a Distributed Database System -- 15.2.5 Security Policy Integration -- 15.2.6 Query Modification -- 15.2.7 View Mechanism -- 15.2.8 SQL for Distributed Database Security -- 15.3 Security Impact on Distributed Database Functions -- 15.4 Security for Emerging Distributed System Technologies -- 15.5 Summary and Directions -- References -- Exercises -- 16 Multilevel Security for Distributed Database Systems -- 16.1 Overview -- 16.2 Background -- 16.3 Architectures -- 16.3.1 Distributed Data and Centralized Control -- 16.3.2 Distributed Data and Distributed Control -- 16.4 Data Modeling -- 16.5 Functions -- 16.6 Inference Problem for a MLS/DDBMS -- 16.7 Summary and Directions -- References -- Exercises -- 17 Secure Heterogeneous and Federated Database Systems -- 17.1 Overview -- 17.2 Background -- 17.3 Architectures -- 17.4 Schema Integration -- 17.5 Policy Integration -- 17.6 Functions -- 17.7 Inference Problem -- 17.8 Secure Client/Server Database Management -- 17.9 Secure Migration of Legacy Databases and Applications -- 17.10 Summary and Directions -- References -- Exercises -- Conclusion to Part VI -- PART VII: SECURE OBJECT AND MULTIMEDIA SYSTEMS -- 18 Discretionary and Multilevel Security for Object -- Database Systems -- 18.1 Overview -- 18.2 Discretionary Security -- 18.2.1 Overview -- 18.2.2 Policy Issues -- 18.2.3 Policy Enforcement -- 18.2.4 Example Systems -- 18.2.4.1 Overview -- 18.2.4.2 ORION -- 18.2.4.3 IRIS -- 18.2.4.4 STARBURST -- 18.2.4.5 GEMSTONE -- 18.3 Multilevel Security -- 18.3.1 Overview -- 18.3.2 Policy Issues -- 18.3.3 System Design Issues -- 18.3.4 Example Systems -- 18.3.4.1 Overview -- 18.3.4.2 SODA System -- 18.3.4.3 SORION Model -- 18.3.4.4 S02 Model -- 18.3.4.5 Millen-Lunt Model -- 18.3.4.6 Jajodia-Kogan Model -- 18.3.4.7 Morgenstern's Model -- 18.3.4.8 UFOS Model. -- 18.4 Summary and Directions -- References -- Exercises -- 19 Aspects of Objects and Security -- 19.1 Overview -- 19.2 Security for Object Request Brokers -- 19.2.1 Overview -- 19.2.2 OMG Security Services -- 19.2.3 Secure Components and Frameworks -- 19.3 Object Modeling for Secure Applications -- 19.3.1 Overview -- 19.3.2 Multilevel OMT -- 19.3.3 UML and Security -- 19.4 Summary and Directions -- References -- Exercises -- 20 Secure Multimedia Data Management Systems -- 20.1 Overview -- 20.2 Security for Multimedia Data Management Systems -- 20.2.1 Overview -- 20.2.2 Security Policy -- 20.2.3 Secure System Architectures for Multimedia -- Database Systems -- 20.2.4 Secure Data Models for Multimedia Database Systems -- 20.2.5 Security Impact on Multimedia Data and Information -- Management Functions -- 20.2.6 Secure Distributed Multimedia Data Management -- 20.2.7 Inference Problem -- 20.3 Secure Geospatial Information Systems -- 20.4 Summary and Directions -- References -- Exercises -- Conclusion to Part Vll -- PART VIII: DATA WAREHOUSING, DATA MINING, -- SECURITY, AND PRIVACY -- 21 Secure Data Warehousing -- 21.1 Overview -- 21.2 Background -- 21.3 Secure Information Technologies for Data Warehousing -- 21.4 Designing a Secure Data Warehouse -- 21.5 Data Quality and Data Warehousing -- 21.6 A Note on Multilevel Security -- 21.7 Secure Data Warehousing, Data Mining, and Decision Support -- 21.8 Summary and Directions -- References -- Exercises -- 22 Data Mining for Security Applications -- 22.1 Overview -- 22.2 Data Mining for National Security -- 22.2.1 Overview -- 22.2.2 Non-Information-Related Terrorism -- 22.2.2.1 Terrorist Attacks and External Threats -- 22.2.2.2 Insider Threats -- 22.2.2.3 Transportation and Border Security Violations -- 22.2.3 Data Mining for National Security Applications -- 22.2.3.1 Non-Real-Time Threats -- 22.2.3.2 Real-Time Threats -- 22.2.3.3 Analyzing the Techniques -- 22.2.3.4 Link Analysis -- 22.3 Data Mining for Cyber-Security -- 22.3.1 Overview -- 22.3.2 Cyber-Terrorism, Insider Threats, and External Attacks -- 22.3.3 Malicious Intrusions -- 22.3.4 Credit Card Fraud and Identity Theft -- 22.3.5 Attacks on Critical Infrastructure -- 22.3.6 Data Mining for Cyber-Security -- 22.4 Summary and Directions -- References -- Exercises -- 23 Privacy -- 23.1 Overview -- 23.2 Privacy Considerations -- 23.3 Data Warehousing, Data Mining, Security, and Privacy -- 23.4 Inference Problem and Privacy -- 23.5 Privacy-Enhanced/Sensitive/Preserving Data Mining -- 23.6 Confidentiality and Privacy -- 23.7 Civil Liberties and National Security -- 23.8 Federated Data Management, Data Sharing, and Privacy -- 23.9 Summary and Directions -- References -- Exercises -- Conclusion to Part VIll -- PART IX: SECURE WEB DATA AND INFORMATION -- MANAGEMENT TECHNOLOGIES -- 24 Secure Web Data Management and Digitallibraries -- 24.1 Overview -- 24.2 Threats to Web Security -- 24.2.1 Overview -- 24.2.2 General Cyber-Threats -- 24.2.3 Threats to Web Databases -- 24.3 Web Security Solutions -- 24.3.1 Overview -- 24.3.2 Solutions for General Threats -- 24.3.2.1 Securing Components and Firewalls -- 24.3.2.2 Cryptography -- 24.3.2.3 Risk Analysis -- 24.3.2.4 Biometrics, Forensics, and Other Solutions -- 24.3.3 Solutions for Threats to Web Databases -- 24.3.3.1 Data Mining -- 24.3.3.2 Constraint Processing -- 24.3.3.3 Role-Based Access Control -- 24.3.3.4 Fault-Tolerant Processing, Recovery, and -- Replication -- 24.4 Secure Digital Libraries -- 24.4.1 Overview -- 24.4.2 Secure Web Database Functions -- 24.4.3 Secure Information Retrieval -- 24.4.4 Secure Search Engines -- 24.4.5 Secure Markup Languages -- 24.4.6 Secure Question-Answering Systems -- 24.5 Summary and Directions -- References -- Exercises -- 25 Security for XML, RDF, and the Semantic Web -- 25.1 Overview -- 25.2 Security for the Semantic Web -- 25.2.1 Overview -- 25.2.2 XML Security -- 25.2.3 RDF Security -- 25.2.4 Secure Information Interoperability -- 25.2.5 Secure Query and Rules Processing for the -- Semantic Web -- 25.2.6 Trust for the Semantic Web -- 25.3 Access Control and Dissemination of XML Documents -- 25.4 Privacy and the Semantic Web -- 25.4.1 Overview -- 25.4.2 Data Mining, National Security, Privacy, and the -- Semantic Web -- 25.4.3 Solutions to the Privacy Problem -- 25.5 Secure Web Services -- 25.6 Secure Agents and Related Technologies -- 25.7 Secure Grid and Secure Semantic Grid -- 25.8 Security Impact on the Database as a Service Model -- 25.9 Summary and Directions -- References -- Exercises ~ -- 26 Secure E-Commerce, Collaboration, and Knowledge -- Management -- 26.1 Overview -- 26.2 Secure E-Commerce -- 26.3 Secure Workflow and Collaboration -- 26.4 Secure Knowledge Management -- 26.5 Secure Peer-to-Peer Data Management -- 26.6 Secure Dynamic Coalitions and Virtual Organizations -- 26.7 Trust and Rights Management -- 26.8 Security Informatics -- 26.9 Summary and Directions -- References -- Exercises -- Conclusion to Part IX -- PART X: EMERGING SECURE DATA MANAGEMENT -- lECHNOLOGIES AND APPLICATIONS -- 27 Secure Dependable -- Data Management -- 27.1 Overview -- 27.2 Dependable Systems -- 27.3 Dependable Infrastructure and Data Management -- 27.3.1 Overview -- 27.3.2 Dependable Infrastructure -- 27.3.3 Dependable Data Managers -- 27.3.4 Security Issues -- 27.4 Data Quality -- 27.4.1 Overview -- 27.4.2 Developments in Data Quality -- 27.4.3 Annotations for Data Quality -- 27.4.4 Semantic Web and Data Quality -- 27.4.5 Data Mining and Data Quality -- 27.4.6 Security and Data Quality -- 27. 5 Critical Infrastructure Protection -- 27.6 Summary and Directions -- References -- Exercises -- 28 Secure Sensor and Wireless Information Management -- 28.1 Overview -- 28.2 Security for Sensor Databases -- 28.2.1 Overview -- 28.2.2 Security Policy -- 28.2.3 Security Architectures -- 28.2.4 Security Impact on Sensor Database Functions -- 28.2.5 Secure Distributed Sensor Data Management -- 28.2.6 Inference Problem -- 28.2.7 Privacy Considerations -- 28.3 Secure Sensor Data Management Issues Unique to Sensor -- Networks -- 28.3.1 Overview -- 28.3.2 Strategic Path Reliability in Information-Gathering -- Sensor Networks -- 28.3.3 Handling Non-overlapping and Incomparable -- Security Levels -- 28.3.4 Security Architectural Impact on Sensor Networks -- 28.3.5 Handling Unique Constraints -- 28.4 Secure Wireless and Mobile Data Management -- 28.5 A Note on Secure Telecommunications Information -- Management. -- 28.6 Security for Moving Databases -- 28.7 Summary and Directions -- References -- Exercises -- 29 Digital Identity, Forensics, and Related Topics -- 29.1 Overview -- 29.2 Digital Identity -- 29.3 Identity Theft Management -- 29.4 Biometrics -- 29.5 Digital Forensics -- 29.6 Steganography and Digital Watermarking -- 29.7 Risk and Economic Analysis -- 29.8 Other Secure Systems and Applications -- 29.9 The Role of Database and Applications Security -- for Homeland Security -- 29.10 Summary and Directions -- References -- Exercises -- Conclusion to Part X -- 30 Summary and Directions -- 30.1 About This Chapter -- 30.2 Summary of This Book -- 30.3 Directions for Database and Applications Security -- 30.4 Where Do We Go from Here? -- Appendices -- A Data Management Systems: Developments -- Trends -- A.1 Overview -- A.2 Developments in Database Systems -- A.3 Status, Vision, and Issues -- A.4 Data Management Systems Framework -- A.5 Building Information Systems from the Framework -- A.6 Relationship between the Texts -- A.7 Summary -- References -- B Suggested Reading: Books in Database Systems and -- Information Security -- Database Systems -- Information and Database Security -- Distributed Database Systems -- Object Databases, Distributed Objects, and Object Modeling -- Multimedia Databases -- Intelligent and Deductive Database Systems -- Data Warehousing and Mining -- Digital Libraries, Web Database Management, and the Semantic Web -- Knowledge Management -- Sensor Networks and Sensor Information Management -- Index.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책