ABSTRACT

This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections,

chapter 1|20 pages

Introduction

part |2 pages

PART I: SUPPORTING TECHNOLOGIES FOR DATABASE AND APPLICATIONS SECURITY

chapter 2|38 pages

Data Management Technologies

chapter 3|16 pages

Information Security

chapter 4|34 pages

Information Management Technologies

chapter |2 pages

Conclusion to Part I

part |2 pages

PART II: DISCRETIONARY SECURITY FOR DATABASE SYSTEMS

chapter 5|12 pages

Security Policies

chapter 6|10 pages

Policy Enforcement and Related Issues

chapter |2 pages

Conclusion to Part II

part |2 pages

PART III: MANDATORY SECURITY FOR DATABASE SYSTEMS

chapter 7|18 pages

Historical Developments

chapter 8|12 pages

Design Principles

chapter |2 pages

Conclusion to Part III

part |2 pages

PART IV: MULTILEVEL SECURE RELATIONAL DATABASE SYSTEMS

chapter 9|12 pages

Multilevel Relational Data Models

chapter 10|10 pages

Security Impact on Database Functions

chapter 11|16 pages

Prototypes and Products

chapter |2 pages

Conclusion to Part IV

part |2 pages

PART V: THE INFERENCE PROBLEM

chapter 12|12 pages

A Perspective of the Inference Problem

chapter 14|24 pages

Conceptual Structures for Inference Control

chapter |2 pages

Conclusion to Part V

part |2 pages

PART VI: SECURE DISTRIBUTED AND HETEROGENEOUS DATABASE SYSTEMS

part |2 pages

PART VII: SECURE OBJECT AND MULTIMEDIA SYSTEMS

chapter 19|12 pages

Aspects of Objects and Security

chapter 20|16 pages

Secure Multimedia Data Management Systems

chapter |2 pages

Conclusion to Part VII

part |2 pages

PART VIII: DATA WAREHOUSING, DATA MINING, SECURITY, AND PRIVACY

chapter 21|18 pages

Secure Data Warehousing

chapter 22|20 pages

Data Mining for Security Applications

chapter 23|18 pages

Privacy

chapter |2 pages

Conclusion to Part VIII

part |2 pages

PART IX: SECURE WEB DATA AND INFORMATION MANAGEMENT TECHNOLOGIES

part |2 pages

PART X: EMERGING SECURE DATA MANAGEMENT TECHNOLOGIES AND APPLICATIONS

chapter 27|18 pages

Secure Dependable Data Management

chapter |2 pages

Conclusion to Part X

chapter 30|12 pages

Summary and Directions