標(biāo)題: Titlebook: Database Security XI; Status and Prospects T. Y. Lin,Shelly Qian Book 1998 IFIP International Federation for Information Processing 1998 Ac [打印本頁(yè)] 作者: 時(shí)間 時(shí)間: 2025-3-21 18:30
書(shū)目名稱(chēng)Database Security XI影響因子(影響力)
作者: 混沌 時(shí)間: 2025-3-21 22:17 作者: 被詛咒的人 時(shí)間: 2025-3-22 04:01
Women in the Political Backgroundis claim for B+trees by providing a detailed performance analysis for this index structure. We also give the algorithms for inserting and deleting key values, as well as for searching for a key value, in the proposed index structure.作者: Observe 時(shí)間: 2025-3-22 06:28 作者: 商店街 時(shí)間: 2025-3-22 10:18 作者: Herbivorous 時(shí)間: 2025-3-22 14:32
A Two-tier Coarse Indexing Scheme for MLS Database Systemsis claim for B+trees by providing a detailed performance analysis for this index structure. We also give the algorithms for inserting and deleting key values, as well as for searching for a key value, in the proposed index structure.作者: Herbivorous 時(shí)間: 2025-3-22 20:09 作者: 說(shuō)笑 時(shí)間: 2025-3-22 21:43 作者: Unsaturated-Fat 時(shí)間: 2025-3-23 02:21
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authnts during the completion of tasks in accordance with some application logic. By taking a task-oriented view of access control and authorizations, TBAC lays the foundation for research into a new breed of “active” security models that are required for agent-based distributed computing and workflow management.作者: 發(fā)炎 時(shí)間: 2025-3-23 09:07 作者: 包裹 時(shí)間: 2025-3-23 13:45
Politikwissenschaftliche Paperbacksage transferred in the system. This paper uses a compile-time approach and presents algorithms for flow control which are applied at Rule-administration and Compile times, thus saving considerable runtime overhead. Special emphasis is put on the Flow-analysis of Methods and the transactions invoking them.作者: 淺灘 時(shí)間: 2025-3-23 16:38 作者: ALLEY 時(shí)間: 2025-3-23 22:03
Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databasesage transferred in the system. This paper uses a compile-time approach and presents algorithms for flow control which are applied at Rule-administration and Compile times, thus saving considerable runtime overhead. Special emphasis is put on the Flow-analysis of Methods and the transactions invoking them.作者: 就職 時(shí)間: 2025-3-23 23:13
https://doi.org/10.1057/9780333982785 through decoupled, distributed components that coordinate to provide database capabilities. Key security issues include security context and responsibilities in n-tiered architectures and in decoupled data management components, security-awareness of applications, and assurance.作者: 消極詞匯 時(shí)間: 2025-3-24 04:17
https://doi.org/10.1007/978-3-663-09508-8model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Environment, providing a common foundation for access control in heterogeneous object models.作者: 浮雕 時(shí)間: 2025-3-24 10:31 作者: 手銬 時(shí)間: 2025-3-24 11:58
Distributed object technologies, databases, and security and security. Data management can be implemented either through distributed object interfaces added to a conventional database system architecture or through decoupled, distributed components that coordinate to provide database capabilities. Key security issues include security context and responsi作者: reserve 時(shí)間: 2025-3-24 15:04 作者: ciliary-body 時(shí)間: 2025-3-24 22:03
Web implementation of a security mediator for medical databasese some of their protected information, tools are being developed to facilitate the information transfer while protecting the privacy of the data. To this end, under the TIHI project, we have designed a . a software entity that screens both incoming queries and outgoing results for compliance with a 作者: 污穢 時(shí)間: 2025-3-25 01:34
Supporting the requirements for multi-level secure and real-time databases in distributed environmense to have partial security in order to improve on real-time performance when necessary. By our definition, systems that are partially secure allow security violations between only certain levels. We present the ideas behind a specification language that allows database designers to specify importan作者: 頌揚(yáng)本人 時(shí)間: 2025-3-25 06:02
A principled approach to object deletion and garbage collection in multilevel secure object basesODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.作者: Pde5-Inhibitors 時(shí)間: 2025-3-25 08:29
Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databasesd policies for Methods and Inheritance. However, discretionary authorization models do not provide the high assurance required in systems where Information flow is considered a problem. Mandatory models can solve the problem but usually they are too rigid for commercial applications. Therefore discr作者: FLIT 時(shí)間: 2025-3-25 12:05
Capability-based primitives for access control in object-oriented systemsommon foundation for access control in object-oriented systems. This paper presents a primitive capability-based access control architecture that can model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Envir作者: PRE 時(shí)間: 2025-3-25 19:46
An execution model for multilevel secure workflowsctivities (or tasks) in a workflow, task dependencies are specified among them. In a multilevel secure (MLS) workflow, tasks may belong to different security levels. Ensuring the task dependencies from the tasks at higher security levels to those at lower security level (high-to-low dependencies) ma作者: conservative 時(shí)間: 2025-3-25 21:50
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented auth access controls from a task-oriented perspective than the traditional subject-object one. Access mediation now involves authorizations at various points during the completion of tasks in accordance with some application logic. By taking a task-oriented view of access control and authorizations, TBA作者: Cirrhosis 時(shí)間: 2025-3-26 03:12
Alter-egos and Roles — Supporting Workflow Security in Cyberspacefor security. Firstly, since the description of a workflow process explicitly states when which function is to be performed by . security specifications may be automatically derived from such descriptions. Secondly, the derived security specifications have to be enforced. This paper considers these 作者: Affluence 時(shí)間: 2025-3-26 06:23
A Two-tier Coarse Indexing Scheme for MLS Database Systemse and reducing the storage required for indexing. At the bottom tier, our scheme requires separate single-level indices, one for each partition of the multilevel relation; at the top tier, our scheme requires a . multilevel index consisting of only those key values from the single-level indices that作者: LAITY 時(shí)間: 2025-3-26 09:34 作者: 減去 時(shí)間: 2025-3-26 12:41
A principled approach to object deletion and garbage collection in multilevel secure object basesODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.作者: 誘惑 時(shí)間: 2025-3-26 20:20
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/d/image/263384.jpg作者: syring 時(shí)間: 2025-3-26 21:21 作者: obtuse 時(shí)間: 2025-3-27 03:49
https://doi.org/10.1057/9780230376120Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.作者: 不可比擬 時(shí)間: 2025-3-27 07:59
Security issues in data warehousing and data mining: panel discussionThis paper describes the panel discussion on data warehousing, data mining and security.作者: flavonoids 時(shí)間: 2025-3-27 11:15
Replication does survive information warfare attacksRecent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.作者: 小卒 時(shí)間: 2025-3-27 13:52 作者: Ledger 時(shí)間: 2025-3-27 20:23 作者: 模仿 時(shí)間: 2025-3-28 01:25
Parliament and the Constitutione some of their protected information, tools are being developed to facilitate the information transfer while protecting the privacy of the data. To this end, under the TIHI project, we have designed a . a software entity that screens both incoming queries and outgoing results for compliance with a 作者: 細(xì)絲 時(shí)間: 2025-3-28 04:23 作者: 絕緣 時(shí)間: 2025-3-28 09:11 作者: Instrumental 時(shí)間: 2025-3-28 12:00
Politikwissenschaftliche Paperbacksd policies for Methods and Inheritance. However, discretionary authorization models do not provide the high assurance required in systems where Information flow is considered a problem. Mandatory models can solve the problem but usually they are too rigid for commercial applications. Therefore discr作者: artless 時(shí)間: 2025-3-28 18:01
https://doi.org/10.1007/978-3-663-09508-8ommon foundation for access control in object-oriented systems. This paper presents a primitive capability-based access control architecture that can model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Envir作者: GULLY 時(shí)間: 2025-3-28 19:44
Daniel Lindmark,Erik J. Anderssonctivities (or tasks) in a workflow, task dependencies are specified among them. In a multilevel secure (MLS) workflow, tasks may belong to different security levels. Ensuring the task dependencies from the tasks at higher security levels to those at lower security level (high-to-low dependencies) ma作者: 教義 時(shí)間: 2025-3-28 23:48 作者: 大罵 時(shí)間: 2025-3-29 06:07
Stefan Gelfgren,Daniel Lindmarkfor security. Firstly, since the description of a workflow process explicitly states when which function is to be performed by . security specifications may be automatically derived from such descriptions. Secondly, the derived security specifications have to be enforced. This paper considers these 作者: 黑豹 時(shí)間: 2025-3-29 09:10
Women in the Political Backgrounde and reducing the storage required for indexing. At the bottom tier, our scheme requires separate single-level indices, one for each partition of the multilevel relation; at the top tier, our scheme requires a . multilevel index consisting of only those key values from the single-level indices that作者: Brocas-Area 時(shí)間: 2025-3-29 14:36
https://doi.org/10.1007/978-3-031-51205-6n the form of a deadline and is represented by a priority to be used by schedulers. In many real-time applications, security is another important requirement, since the system maintains sensitive information to be shared by multiple users with different levels of security clearance. As more advanced作者: 努力趕上 時(shí)間: 2025-3-29 18:16 作者: debble 時(shí)間: 2025-3-29 20:30
https://doi.org/10.1007/978-3-663-09508-8ODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.作者: SLING 時(shí)間: 2025-3-30 02:45
Book 1998This book aims to discuss in depth the current state ofresearch and practice in database security. It documents progress andprovidesresearchers and students with a broad perspective of recentdevelopments in what is recognised as a key topic in business and inthe public sector.作者: Evocative 時(shí)間: 2025-3-30 05:55 作者: 容易生皺紋 時(shí)間: 2025-3-30 10:01 作者: Extort 時(shí)間: 2025-3-30 13:50
Designing security agents for the DOK federated systems allow the coordination of different federated activities, (ii) task agents perform specific tasks of the federation, and finally (iii) database agents provide the required information for coordination and task agents.作者: 整理 時(shí)間: 2025-3-30 17:13
An execution model for multilevel secure workflowsWe propose algorithms to automatically redesign the workflow and demonstrate that only a small subset among all the types of high-to-low dependencies requires to be executed by trusted subjects and all other types can be executed without compromising security.作者: Absenteeism 時(shí)間: 2025-3-30 20:58 作者: Dendritic-Cells 時(shí)間: 2025-3-31 03:20 作者: 深淵 時(shí)間: 2025-3-31 07:52 作者: Fabric 時(shí)間: 2025-3-31 10:25 作者: FLAG 時(shí)間: 2025-3-31 16:09
,Das B?rsenbureau, Führung der zur ordnungsm??igen Erledigung dieser Gesch?fte notwendigen Bücher getrennt. Ein ?hnlicher Unterschied wurde auch beim Wechselbureau in Anwendung gebracht. Beim B?rsenbureau ergibt sich diese Trennung von selbst, weil die B?rsengesch?fte nicht in den R?umen der Bank, sondern an der B?rse abgeschlossen werden.