’ s preface
نویسندگان
چکیده
This Special Issue of the Journal of Computer Security comprises of three papers presented at the 13th IFIP 11.3 Working group conference on Database Security, which was held in Seattle, Washington, in July 1999. The primary objective of this annual conference is to disseminate original research results and development efforts in the area of database security, and to provide a platform for researchers and practitioners to share their knowledge and experience. The three papers in this special issue were invited submissions that were substantially extended for journal publication and subjected to the customary review process of the Journal of Computer Security. These three papers address different levels of data protection: access control to prevent access by unauthorized users, preventing leakage of sensitive information through legitimate access to non-sensitive data via inference, and detection of malicious activity by either authorized or unauthorized users. The first paper, “Intrusion confinement by isolation in information systems” by Peng Liu, Sushil Jajodia and Catherine D. McCollum, presents an approach to limit the damage caused by intrusions and minimize detection latency. The key idea is to isolate the suspicious users and allow them to access a copy of the database, instead of the main database. When a suspicious user turns out to be malicious, the corresponding copy is discarded. On the other hand, if the suspicious user turns out to be innocent, the corresponding copy is merged into the main database. The merging techniques are adopted from the replicated database literature to resolve mutual inconsistency. The second paper, “Using sample size to limit exposure to data mining” by Chris Clifton shows how lower bounds from pattern recognition theory can be used to determine sample sizes where data mining tools cannot obtain reliable results to infer sensitive data from non-sensitive data. This knowledge can thus be used to state and enforce clear limits on what can be learned from systematic data mining. The third paper, “Temporal authorization bases: From specification to integration” by Elisa Bertino, Piero Andrea Bonatti, Elena Ferrari and Maria Luisa Sapino presents a flexible authorization mechanism in which authorizations can be specified with temporal validity. Moreover, it allows subjects and objects to have hierarchical relationships where authorizations can be inherited from general to specific subjects and objects. It provides a means to deal with inconsistencies that arise due to the specification of both positive and negative authorizations that are valid during cer-
منابع مشابه
مطالعه تطبیقی دیباچه دوستمحمد گواشانی هروی و دیباچه قطبالدین محمد قصهخوان
From among art history written sources in Iran, one can enumerate two prefaces in the Safavid era were written by a decade interval. One preamble is Doust Mohammad Gvashany’s on Bahram Mirza Album (952 AH) and the other is that written by Qutb al-Din Muhammad Shah Tahmasp Album (964 AH). Many authors in the Safavid era, exploited directly and/or indirectly these two prefaces ‘ conte...
متن کاملEditorial Preface Search Engine Technology: A Closer Look at Its Future
This editorial preface will describe the need for new technology for search engines, the two generations of search engine technologies used, and the need for a third generation search engine. We will discuss the limitations of today’s search engines and difficulties in determining relevancy of the search and the need for a context-sensitive ranking system, and take a closer look at the future o...
متن کاملMeasures of Patient Safety - Studies of Swedish Reporting Systems and Evaluation of an Intervention Aimed at Improved Patient Safety Culture
S ........................................................................................................................... 1 LIST OF PAPERS .................................................................................................................... 3 PREFACE ..................................................................................................................................
متن کامل