Skip to content

Database Security

Best in textbook rentals since 2012!

ISBN-10: 0201593750

ISBN-13: 9780201593754

Edition: 1st 1995

Authors: Silvana Castano

List price: $54.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

The competitive edge of many companies and public trust in government institutions can often depend on the security of the information now held in databases. Breaches of that security are a highly topical issue for both designers and users of database systems. This book provides an authoritative account of security issues in database systems, and shows how current commercial or future systems may be designed to ensure both integrity and confidentiality. It gives a full account of alternative security models and protection measures, including those for new-generation systems like distributed, frame-based and object-oriented databases. The book can serve as a text for advanced courses on DB…    
Customers also bought

Book details

List price: $54.99
Edition: 1st
Copyright year: 1995
Publisher: Addison Wesley Professional
Publication date: 11/11/1994
Binding: Hardcover
Pages: 480
Size: 6.50" wide x 9.50" long x 0.75" tall
Weight: 1.848
Language: English

Information Security
Introduction
Introduction to Databases Security
Problems in Databases Security Controls Conclusions
Security Models
Introduction Access
Matrix Model
Take-Grant Model
Acten Model PN Model
Hartson and Hsiao's Model
Fernandez's Model
Bussolati and Martella's Model for Distributed databases
Bell and LaPadula's Model
Biba's Model
Dion's Model
Sea View Model
Jajodia and Sandhu's Model
The Lattice Model for the Flow Control conclusion
Security Mechanisms
Introduction User Identification/Authentication
Memory Protection
Resource Protection
Control Flow Mechanisms
Isolation Security Functionalities in Some Operating Systems
Trusted Computer System Evaluation Criteria
Security Software Design
Introduction A Methodological Approach to Security
Software Design Secure
Operating System Design Secure
DBMS Design Security Packages
Database Security Design
Statistical Database Protection
Introduction Statistics Concepts and Definitions
Types of Attacks Inference Controls evaluation
Criteria for Control Comparison
Intrusion Detection Systems
Introduction IDES System RETISS System ASES System Discovery
Models For The Protection Of New Generation Database Systems
Introduction A Model for the Protection of Frame Based Systems
A Model for the Protection of Object-Oriented Systems
SORION Model for the Protection of Object-Oriented
Databases a Model for the Protection of New Generation
Database Systems: the Orion Model Jajodia and Kogan's Model
A Model for the Protection of Active Databases
Conclusions