<p>Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A <em>multilevel secure database management system</em> (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory securit
Security of Data and Transaction Processing
β Scribed by Vijay Atluri, Pierangela Samarati (auth.), Vijay Atluri, Pierangela Samarati (eds.)
- Publisher
- Springer US
- Year
- 2000
- Tongue
- English
- Leaves
- 143
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area.
Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
β¦ Table of Contents
Front Matter....Pages i-3
Guest Editorβs Introduction....Pages 5-6
Rewriting Histories: Recovering from Malicious Transactions....Pages 7-40
Secure Concurrency Control in Firm Real-Time Database Systems....Pages 41-83
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments....Pages 85-117
Providing Security and Interoperation of Heterogeneous Systems....Pages 119-145
β¦ Subjects
Management of Computing and Information Systems; Data Structures, Cryptology and Information Theory; Document Preparation and Text Processing; Information Storage and Retrieval
π SIMILAR VOLUMES
<p><P>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding a
<p><P>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding a
<p><P>Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding a