
Database Security
by Castano, Silvana; Castano, Silvana; Fugini, Mariagrazi; Martella, Giancarlo; Samarati, Pierangela-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
Information Security | |
Introduction | |
Introduction to Databases Security | |
Problems in Databases Security Controls Conclusions | |
Security Models | |
Introduction Access | |
Matrix Model | |
Take-Grant Model | |
Acten Model PN Model | |
Hartson and Hsiao's Model | |
Fernandez's Model | |
Bussolati and Martella's Model for Distributed databases | |
Bell and LaPadula's Model | |
Biba's Model | |
Dion's Model | |
Sea View Model | |
Jajodia and Sandhu's Model | |
The Lattice Model for the Flow Control conclusion | |
Security Mechanisms | |
Introduction User Identification/Authentication | |
Memory Protection | |
Resource Protection | |
Control Flow Mechanisms | |
Isolation Security Functionalities in Some Operating Systems | |
Trusted Computer System Evaluation Criteria | |
Security Software Design | |
Introduction A Methodological Approach to Security | |
Software Design Secure | |
Operating System Design Secure | |
DBMS Design Security Packages | |
Database Security Design | |
Statistical Database Protection | |
Introduction Statistics Concepts and Definitions | |
Types of Attacks Inference Controls evaluation | |
Criteria for Control Comparison | |
Intrusion Detection Systems | |
Introduction IDES System RETISS System ASES System Discovery | |
Models For The Protection Of New Generation Database Systems | |
Introduction A Model for the Protection of Frame Based Systems | |
A Model for the Protection of Object-Oriented Systems | |
SORION Model for the Protection of Object-Oriented | |
Databases a Model for the Protection of New Generation | |
Database Systems: the Orion Model Jajodia and Kogan's Model | |
A Model for the Protection of Active Databases | |
Conclusions | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.