ABSTRACT
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections,
TABLE OF CONTENTS
part |2 pages
PART I: SUPPORTING TECHNOLOGIES FOR DATABASE AND APPLICATIONS SECURITY
part |2 pages
PART II: DISCRETIONARY SECURITY FOR DATABASE SYSTEMS
part |2 pages
PART III: MANDATORY SECURITY FOR DATABASE SYSTEMS
part |2 pages
PART IV: MULTILEVEL SECURE RELATIONAL DATABASE SYSTEMS
part |2 pages
PART V: THE INFERENCE PROBLEM
part |2 pages
PART VI: SECURE DISTRIBUTED AND HETEROGENEOUS DATABASE SYSTEMS
part |2 pages
PART VII: SECURE OBJECT AND MULTIMEDIA SYSTEMS
part |2 pages
PART VIII: DATA WAREHOUSING, DATA MINING, SECURITY, AND PRIVACY
part |2 pages
PART IX: SECURE WEB DATA AND INFORMATION MANAGEMENT TECHNOLOGIES
part |2 pages
PART X: EMERGING SECURE DATA MANAGEMENT TECHNOLOGIES AND APPLICATIONS