Data and Application Security: Developments and Directions
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the pu...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2001
|
Ausgabe: | 1st ed. 2001 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
73 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000 |
Beschreibung: | 1 Online-Ressource (XIV, 378 p) |
ISBN: | 9780306470080 |
DOI: | 10.1007/b115728 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064461 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2001 |||| o||u| ||||||eng d | ||
020 | |a 9780306470080 |9 978-0-306-47008-0 | ||
024 | 7 | |a 10.1007/b115728 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-306-47008-0 | ||
035 | |a (OCoLC)1227482418 | ||
035 | |a (DE-599)BVBBV047064461 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.82 |2 23 | |
245 | 1 | 0 | |a Data and Application Security |b Developments and Directions |c edited by B. Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari |
250 | |a 1st ed. 2001 | ||
264 | 1 | |a New York, NY |b Springer US |c 2001 | |
300 | |a 1 Online-Ressource (XIV, 378 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 73 | |
520 | |a New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000 | ||
650 | 4 | |a Cryptology | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computers | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Information storage and retrieval | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2000 |z Schoorl |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Thuraisingham, B. |4 edt | |
700 | 1 | |a van de Riet, Reind |4 edt | |
700 | 1 | |a Dittrich, Klaus R. |4 edt | |
700 | 1 | |a Tari, Zahir |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475775020 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475775013 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792375142 |
856 | 4 | 0 | |u https://doi.org/10.1007/b115728 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471572 | ||
966 | e | |u https://doi.org/10.1007/b115728 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062497792000 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Thuraisingham, B. van de Riet, Reind Dittrich, Klaus R. Tari, Zahir |
author2_role | edt edt edt edt |
author2_variant | b t bt d r r v drr drrv k r d kr krd z t zt |
author_facet | Thuraisingham, B. van de Riet, Reind Dittrich, Klaus R. Tari, Zahir |
building | Verbundindex |
bvnumber | BV047064461 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-306-47008-0 (OCoLC)1227482418 (DE-599)BVBBV047064461 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/b115728 |
edition | 1st ed. 2001 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03581nmm a2200637zcb4500</leader><controlfield tag="001">BV047064461</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780306470080</subfield><subfield code="9">978-0-306-47008-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b115728</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-306-47008-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227482418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064461</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data and Application Security</subfield><subfield code="b">Developments and Directions</subfield><subfield code="c">edited by B. Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2001</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 378 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">73</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2000</subfield><subfield code="z">Schoorl</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thuraisingham, B.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">van de Riet, Reind</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dittrich, Klaus R.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tari, Zahir</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475775020</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475775013</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792375142</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b115728</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471572</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b115728</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content (DE-588)1071861417 Konferenzschrift 2000 Schoorl gnd-content |
genre_facet | Konferenzschrift Konferenzschrift 2000 Schoorl |
id | DE-604.BV047064461 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9780306470080 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471572 |
oclc_num | 1227482418 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XIV, 378 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Springer US |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Data and Application Security Developments and Directions edited by B. Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari 1st ed. 2001 New York, NY Springer US 2001 1 Online-Ressource (XIV, 378 p) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 73 New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000 Cryptology Management of Computing and Information Systems Theory of Computation Data Structures and Information Theory Information Storage and Retrieval Data encryption (Computer science) Management information systems Computer science Computers Data structures (Computer science) Information storage and retrieval Datensicherung (DE-588)4011144-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content (DE-588)1071861417 Konferenzschrift 2000 Schoorl gnd-content Datensicherung (DE-588)4011144-1 s DE-604 Thuraisingham, B. edt van de Riet, Reind edt Dittrich, Klaus R. edt Tari, Zahir edt Erscheint auch als Druck-Ausgabe 9781475775020 Erscheint auch als Druck-Ausgabe 9781475775013 Erscheint auch als Druck-Ausgabe 9780792375142 https://doi.org/10.1007/b115728 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Data and Application Security Developments and Directions Cryptology Management of Computing and Information Systems Theory of Computation Data Structures and Information Theory Information Storage and Retrieval Data encryption (Computer science) Management information systems Computer science Computers Data structures (Computer science) Information storage and retrieval Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)1071861417 |
title | Data and Application Security Developments and Directions |
title_auth | Data and Application Security Developments and Directions |
title_exact_search | Data and Application Security Developments and Directions |
title_exact_search_txtP | Data and Application Security Developments and Directions |
title_full | Data and Application Security Developments and Directions edited by B. Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari |
title_fullStr | Data and Application Security Developments and Directions edited by B. Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari |
title_full_unstemmed | Data and Application Security Developments and Directions edited by B. Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari |
title_short | Data and Application Security |
title_sort | data and application security developments and directions |
title_sub | Developments and Directions |
topic | Cryptology Management of Computing and Information Systems Theory of Computation Data Structures and Information Theory Information Storage and Retrieval Data encryption (Computer science) Management information systems Computer science Computers Data structures (Computer science) Information storage and retrieval Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Cryptology Management of Computing and Information Systems Theory of Computation Data Structures and Information Theory Information Storage and Retrieval Data encryption (Computer science) Management information systems Computer science Computers Data structures (Computer science) Information storage and retrieval Datensicherung Konferenzschrift Konferenzschrift 2000 Schoorl |
url | https://doi.org/10.1007/b115728 |
work_keys_str_mv | AT thuraisinghamb dataandapplicationsecuritydevelopmentsanddirections AT vanderietreind dataandapplicationsecuritydevelopmentsanddirections AT dittrichklausr dataandapplicationsecuritydevelopmentsanddirections AT tarizahir dataandapplicationsecuritydevelopmentsanddirections |