Multilevel Secure Transaction Processing:
Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requiremen...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2000
|
Ausgabe: | 1st ed. 2000 |
Schriftenreihe: | Advances in Database Systems
16 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing |
Beschreibung: | 1 Online-Ressource (XIV, 126 p) |
ISBN: | 9781461545538 |
DOI: | 10.1007/978-1-4615-4553-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064647 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2000 |||| o||u| ||||||eng d | ||
020 | |a 9781461545538 |9 978-1-4615-4553-8 | ||
024 | 7 | |a 10.1007/978-1-4615-4553-8 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4615-4553-8 | ||
035 | |a (OCoLC)1227482523 | ||
035 | |a (DE-599)BVBBV047064647 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.73 |2 23 | |
100 | 1 | |a Atluri, Vijay |e Verfasser |4 aut | |
245 | 1 | 0 | |a Multilevel Secure Transaction Processing |c by Vijay Atluri, Sushil Jajodia, Binto George |
250 | |a 1st ed. 2000 | ||
264 | 1 | |a New York, NY |b Springer US |c 2000 | |
300 | |a 1 Online-Ressource (XIV, 126 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Database Systems |v 16 | |
520 | |a Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing | ||
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Natural Language Processing (NLP) | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Natural language processing (Computer science) | |
650 | 4 | |a Information storage and retrieval | |
700 | 1 | |a Jajodia, Sushil |4 aut | |
700 | 1 | |a George, Binto |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792377023 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461370550 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461545545 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4615-4553-8 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471759 | ||
966 | e | |u https://doi.org/10.1007/978-1-4615-4553-8 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062940291072 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Atluri, Vijay Jajodia, Sushil George, Binto |
author_facet | Atluri, Vijay Jajodia, Sushil George, Binto |
author_role | aut aut aut |
author_sort | Atluri, Vijay |
author_variant | v a va s j sj b g bg |
building | Verbundindex |
bvnumber | BV047064647 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4615-4553-8 (OCoLC)1227482523 (DE-599)BVBBV047064647 |
dewey-full | 005.73 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.73 |
dewey-search | 005.73 |
dewey-sort | 15.73 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4615-4553-8 |
edition | 1st ed. 2000 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03592nmm a2200541zcb4500</leader><controlfield tag="001">BV047064647</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2000 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461545538</subfield><subfield code="9">978-1-4615-4553-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4615-4553-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4615-4553-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227482523</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064647</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.73</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Atluri, Vijay</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Multilevel Secure Transaction Processing</subfield><subfield code="c">by Vijay Atluri, Sushil Jajodia, Binto George</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2000</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 126 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Database Systems</subfield><subfield code="v">16</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Natural Language Processing (NLP)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Natural language processing (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">George, Binto</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792377023</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461370550</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461545545</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4615-4553-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471759</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4615-4553-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064647 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:23Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9781461545538 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471759 |
oclc_num | 1227482523 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XIV, 126 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Springer US |
record_format | marc |
series2 | Advances in Database Systems |
spelling | Atluri, Vijay Verfasser aut Multilevel Secure Transaction Processing by Vijay Atluri, Sushil Jajodia, Binto George 1st ed. 2000 New York, NY Springer US 2000 1 Online-Ressource (XIV, 126 p) txt rdacontent c rdamedia cr rdacarrier Advances in Database Systems 16 Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing Data Structures and Information Theory Management of Computing and Information Systems Natural Language Processing (NLP) Information Storage and Retrieval Data structures (Computer science) Management information systems Computer science Natural language processing (Computer science) Information storage and retrieval Jajodia, Sushil aut George, Binto aut Erscheint auch als Druck-Ausgabe 9780792377023 Erscheint auch als Druck-Ausgabe 9781461370550 Erscheint auch als Druck-Ausgabe 9781461545545 https://doi.org/10.1007/978-1-4615-4553-8 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Atluri, Vijay Jajodia, Sushil George, Binto Multilevel Secure Transaction Processing Data Structures and Information Theory Management of Computing and Information Systems Natural Language Processing (NLP) Information Storage and Retrieval Data structures (Computer science) Management information systems Computer science Natural language processing (Computer science) Information storage and retrieval |
title | Multilevel Secure Transaction Processing |
title_auth | Multilevel Secure Transaction Processing |
title_exact_search | Multilevel Secure Transaction Processing |
title_exact_search_txtP | Multilevel Secure Transaction Processing |
title_full | Multilevel Secure Transaction Processing by Vijay Atluri, Sushil Jajodia, Binto George |
title_fullStr | Multilevel Secure Transaction Processing by Vijay Atluri, Sushil Jajodia, Binto George |
title_full_unstemmed | Multilevel Secure Transaction Processing by Vijay Atluri, Sushil Jajodia, Binto George |
title_short | Multilevel Secure Transaction Processing |
title_sort | multilevel secure transaction processing |
topic | Data Structures and Information Theory Management of Computing and Information Systems Natural Language Processing (NLP) Information Storage and Retrieval Data structures (Computer science) Management information systems Computer science Natural language processing (Computer science) Information storage and retrieval |
topic_facet | Data Structures and Information Theory Management of Computing and Information Systems Natural Language Processing (NLP) Information Storage and Retrieval Data structures (Computer science) Management information systems Computer science Natural language processing (Computer science) Information storage and retrieval |
url | https://doi.org/10.1007/978-1-4615-4553-8 |
work_keys_str_mv | AT atlurivijay multilevelsecuretransactionprocessing AT jajodiasushil multilevelsecuretransactionprocessing AT georgebinto multilevelsecuretransactionprocessing |