Cover image for Secure data management in decentralized systems
Title:
Secure data management in decentralized systems
Series:
Advances in information security
Publication Information:
New York, NY : Springer, 2007
ISBN:
9780387276946
General Note:
Available online version
Electronic Access:
Fulltext

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010133323 TK5105.59 S424 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations. Instead, allowing selective access from different security domains has become a must for many business practices. Many of the assumptions and problems in traditional databases need to be revisited and readdressed in decentralized en- ronments. Further, the Internet and the Web offer means for collecting and sharing data with unprecedented flexibility and convenience. New data services are eme- ing every day, which also bring new challenges to protect of data security. We have witnessed many exciting research works toward identifying and addressing such new challenges. We feel it is necessary to summarize and systematically present works in these new areas to researchers. This book presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions.


Table of Contents

Sushil Jajodia and Ting YuS. De Capitani di Vimercati and S. Foresti and S. Jajodia and P. SamaratiMeng Yu and Peng Liu and Wanyu Zang and Sushil JajodiaMichiharu Kudo and Naizhen QiHui Wang and Divesh Srivastava and Laks V.S. Lakshmanan and SungRan Cho and Sihem Amer-YahiaGrigoris Antoniou and Matteo Baldoni and Piero A. Bonatti and Wolfgang Nejdl and Daniel OlmedillaAdam J. Lee and Kent E. Seamons and Marianne Winslett and Ting YuTerry Bearly and Vijay KumarV. Ciriani and S. De Capitani di Vimercati and S. Foresti and P. SamaratiV. Ciriani and S. De Capitani di Vimercati and S. Foresti, P. SamaratiLingyu Wang and Sushil Jajodia and Duminda WijesekeraHakan Hacigumus and Bijit Hore and Bala Iyer and Sharad Mehrotra
Prefacep. VII
Part I Foundation
Basic Security Conceptsp. 3
Access Control Policies and Languages in Open Environmentsp. 21
Trusted Recoveryp. 59
Part II Access Control for Semi-Structured Data
Access Control Policy Models for XMLp. 97
Optimizing Tree Pattern Queries over Secure XML Databasesp. 127
Part III Distributed Trust Management
Rule-based Policy Specificationp. 169
Automated Trust Negotiation in Open Systemsp. 217
Building Trust and Security in Peer-to-Peer Systemsp. 259
Part IV Privacy in Cross-Domain Information Sharing
Microdata Protectionp. 291
k-Anonymityp. 323
Preserving Privacy in On-line Analytical Processing Data Cubesp. 355
Part V Security in Emerging Data Services
Search on Encrypted Datap. 383
Rights Assessment for Relational Data Radu Sionp. 427
Indexp. 459