ACM Computing Surveys (CSUR)
Application of security tot he computing science classroom
Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
Linux Security Modules: General Security Support for the Linux Kernel
Proceedings of the 11th USENIX Security Symposium
Security Analysis of Electronic Business Processes
Electronic Commerce Research
Managing information security on a shoestring budget
Annals of cases on information technology
An introduction to multilevel secure relational database management systems
CASCON '04 Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research
Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
Database security curriculum in InfoSec program
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Multimedia-based authorization and access control policy specification
Proceedings of the 3rd ACM workshop on Secure web services
A multi-purpose implementation of mandatory access control in relational database management systems
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Multiobjective decision support for defining secure business processes: a case study
International Journal of Business Intelligence and Data Mining
A security evaluation approach for information systems in telecommunication enterprises
Enterprise Information Systems
Teaching database security and auditing
Proceedings of the 40th ACM technical symposium on Computer science education
Multilevel secure data stream processing
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Application of neural networks in network control and information security
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
An electronic reconfigurable neural architecture for intrusion detection
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
Collaborative red teaming for anonymity system evaluation
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS
International Journal of Fuzzy System Applications
Information flow control for stream processing in clouds
Proceedings of the 18th ACM symposium on Access control models and technologies
Invariant preservation in iterative modeling
Proceedings of the 6th International Workshop on Models and Evolution
Hi-index | 0.00 |
From the Publisher:This collection of essays provides a comprehensive summary of practice and research. The essays provide an overview of the vulnerabilities and threats to information security and introduce the important concepts and terms. In addition, the essays summarize the definitions and controls of the trusted computer system evaluation criteria and discuss information security policy focusing on information control and dissemination. Recommendations are presented based on practical experience. Other essays explore the architectures used in the development of trusted relational database management systems, discuss the effects that multilevel DBMS security requirements can have on the system's data integrity, and compare three research DBMS prototypes. Additional essays identify the motivation for using formal methods across different development stages of a trusted computer system, feature a new approach to formal modeling of a trusted computer system, and present a new security model for mandatory access controls in object-oriented database systems. The book concludes with a list of acronyms, a glossary offering multiple definitions of terms, and a list of references from the text.