Research Directions in Database Security
|
|
- Lambert York
- 5 years ago
- Views:
Transcription
1 Research Directions in Database Security
2 Teresa F. Lunt Editor Research Directions in Database Security With 16 Illustrations Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest
3 Teresa F. Lunt Program Manager Secure Systems SRI International 333 Ravenswood Avenue Menlo Park, CA USA Library of Congress Cataloging-in-Publication Data Research directions in database security / Teresa F. Lunt, editor p. cm. Discussions of topics presented at a workshop held at the Vallombrosa Conference and Retreat Center, Menlo Park, Calif., May 24-26, 1988, sponsored by the US Air Force, Rome Air Development Center. Includes bibliographical references and index. 1. Data base security--congresses. 1. Lunt, Teresa F. II. Rome Air Development Center. QA76.9.D314R dc Printed on acid-free paper Springer-Verlag New York, Inc. Softcover reprint of the hardcover 1st edition 1992 All rights reserved. This work may not be translated or copied in whole or in part without the written permission ofthe publisher (Springer-Verlag New York, Inc., 175 Fifth Avenue, New York, NY 10010, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use of general descriptive names, trade names, trademarks, etc., in this publication, even if the former are not especially identified, is not to be taken as a sign that such names, as understood by the Trade Marks and Merchandise Marks Act, may accordingly be used freely by anyone. Production managed by Karen Phillips; manufacturing supervised by Robert Paella. Photocomposed pages prepared from the editor's LATEX file ISBN-13: DOl: / e-isbn-13:
4 Contributors 1 Workshop Summary TERESA F. LUNT 1.1 Introduction. 1.2 Labels Aggregation. Discretionary Security The Homework Problem Classification Semantics Assurance Balanced Assurance TCB Subsetting Layered TCB. New Approaches... Classifying Metadata. Conclusions References. 2 SeaView TERESA F. LUNT 2.1 Introduction. 2.2 Multilevel Security 2.3 Multilevel Relations The Extended Relational Integrity Rules Polyinstantiation Constraints Discretionary Security 2.5 Multilevel SQL The Access Class Data Type Dealing with Polyinstantiation Creating Multilevel Relations 2.6 The SeaView Verification.... xiii
5 vi 2.7 The SeaView Design 2.8 Data Design Considerations 2.9 Conclusions 2.10 References Al Secure DBMS Architecture 33 THOMAS H. HINKE, CRISTI GARVEY, AND AMY Wu 3.1 Introduction The Al Secure DBMS Modes of Operation The Al Secure DBMS Security Policy Overview Al Secure DBMS Architecture Why is ASD Needed? For Further Information References An Investigation of Secure Distributed DBMS Architectures 41 JAMES P. O'CONNOR, JAMES W. GRAY III, CATHERINE MCCOLLUM, AND LouAANNA NOTARGIACOMO 4.1 Introduction Background Requirements Concept of Operation Users Security Policy Overview Discretionary Access Control Mandatory Access Control Architecture Definition Abstract Model Architectural Parameters Family of Architecture Generation Discretionary Access Control Enforcement Summary and Conclusions References LOCK Data Views 63 PAUL STACHOUR 5.1 Introduction Problem Statement Security Policy Overview LOCK Security Policy Overview DBMS Policy Extension Needs DBMS Policy Extensions Pipelines The Response Pipeline Design 69
6 vii LOCK Pipeline Organization Response Pipeline Organization Pipeline Implications. 5.4 Conclusions 5.5 References Sybase Secure SQL Server 81 HELENA WINKLER 6.1 Introduction Terms and Definitions Objectives B2 Design Philosophy Database Server On A Network B2 Sybase Secure SQL Server Flow of Control Login Parsing and Compilation Description of Procedures Execution of Procedures Trusted Operations SSO Trusted Interface User - Trusted Interface Auditing Conclusions An Evolution of Views 91 DOROTHY E. DENNING 7.1 Introduction References Discussion: Pros and Cons of the Various Approaches 97 DOROTHY E. DENNING AND WILLIAM R. SHOCKLEY 8.1 Introduction Inference Problem Aggregation Problem Problem Instances Two Approaches Retrospective References The Homework Problem 105 RAE K. BURNS
7 viii 10 Report on the Homework Problem RAE K. BURNS 10.1 Introduction The Example Database 10.3 Summary Classifying and Downgrading: Is a Human Needed in the Loop? 125 GARY W. SMITH 11.1 Introduction Underlying Concepts Classifying Outputs Semantic Level Approach Classifying and Downgrading The Issue The Answer Structured Data Security Semantics of an Application Types of Security Semantics Textual Data Summary References Session Report: The Semantics of Data Classification 135 GARY W. SMITH 12.1 Introduction References Inference and Aggregation 143 MATTHEW MORGENSTERN, TOM HINKE, AND BHAVANI THURAISINGHAM 13.1 Introduction Database Inference The Problem A Solution Approach The Inference Problem Analysis of Logical Inference Problems When Classifying a Rule is Worse than Useless Sphere of Influence Analysis Network of Constraints Questions General Discussion References
8 ix 14 Dynamic Classification and Automatic Sanitization 161 MARVIN SCHAEFER 14.1 Introduction Sanitization Initial Overclassification Initial Underclassification Discovered Misclassification Automatic Classification References Presentation and Discussion on Balanced Assurance 167 WILLIAM R. SHOCKLEY 15.1 Introduction References Some Results from the Entity/Relationship Multilevel Secure DBMS Project 173 GEORGE E. GAJNAK 16.1 Project Goals and Assumptions A Multilevel Entity/Relationship Model Data Model Semantics Multilevel Security Characteristics Results of Research The Underlying Abstraction Conclusions References Designing a Trusted Application Using an Object-Oriented Data Model 191 CATHERINE MEADOWS AND CARL LANDWEHR 17.1 Introduction The Object-Oriented Data Model The SMMS as an Object-Oriented Database Conclusion and Future Directions References Foundations of Multilevel Databases 199 BHAVANI THURAISINGHAM 18.1 Introduction Definitional Preliminaries Model Theoretic Approach Query Evaluation Database Updates Proof Theoretic Approach Query Evaluation. 209
9 x Database Updates Environments and Fixed Points Environments Mappings Fixed Points Least Environment Declarative and Procedural Semantics Environments and Inference Handling Negative and Indefinite Information Closed-World Assumption Negation by Failure Formal Semantics of Time Other Related Topics Theory of Relational Databases Consistency and Completeness of Security Constraints Assigning Security Levels to Data Conclusion References An Application Perspective on DBMS Security Policies 227 RAE K. BURNS 19.1 Introduction Problems with Automatic Polyinstantiation Polyinstantiation and Entity Integrity Polyinstantiation and Referential Integrity Polyinstantiation verses Application Consistency Problems with Simplistic Mandatory Policies Problems with View-Based Controls and Constraints Requirement for Transaction Authorizations Summary References New Approaches to Database Security: Report on Discussion 235 CATHERINE MEADOWS 20.1 Introduction Report on Discussion Open Problems in Computer Security Old Problems for Operating Systems but New Problems for Database Systems Database-Specific Problems Challenge Posed by Advances in Database Technology Conclusion References
10 21 Metadata and View Classification LouANNA NOTARGIACOMO 21.1 Introduction Justification for Metadata Protection Metadata Classification Approaches Internal Schema Conceptual Schema External Schema Metadata Protection Schemes 21.5 User Access to Metadata Affect of User Session Level on Data Classification 22 Database Security Research at NCSC JOHN R. CAMPBELL 22.1 Introduction Sponsored Research Projects 22.3 The Future Discussion Topics Position Paper on DBMS Security JOSEPH GIORDANO 23.1 Introduction Conclusions Index Xl
11 Contributors Rae K. Burns The MITRE Corporation Burlington Road Bedford, Massachusetts John R. Campbell National Computer Security Center 9800 Savage Road Fort Meade, Maryland Dorothy E. Denning Georgetown University 225 Reiss Science Building Washington, DC George E. Gajnak DEC 151 Taylor Street TAY1 Littleton, Massachusetts Cristi Garvey TRW Defense Systems Group One Space Park Redondo Beach, California Joseph Giordano Rome Laboratory Griffiss Air Force Base Rome, New York James W. Gray III Naval Research Laboratory Washington, DC Thomas H. Hinke Computer Science Department University of Alabama in Huntsville Computer Science Building Huntsville, Alabama Carl Landwehr Office of Research and Development Center for Secure Information Technology Naval Research Laboratory Washington, DC Teresa F. Lunt SRI International, Computer Science Laboratory 333 Ravenswood Avenue Menlo Park, California Catherine McCollum Unisys 8201 Greensboro Drive, Ste 1000 McLean, Virginia Catherine Meadows Office of Research and Development Center for Secure Information Technology Naval Research Laboratory Washington, DC
12 xiv Contributors Matthew Morgenstern Xerox Advanced Information Technology 4 Cambridge Center Cambridge, Massachusetts LouAnna Notargiacomo The MITRE Corporation 7525 Colshire Drive McLean, Virginia James P. O'Connor Software Productivity Consortium Rock Hill Road Herndon, Virginia Marvin Schaefer Trusted Information Systems, Inc Washington Road Route 97 Glenwood, Maryland William R. Shockley DEC TP West 800 West El Camino Real Mountain View, California LTC Gary W. Smith IBM College DOD Computer Institute Washington Navy Yard, Bldg. 175 Washington, DC Paul Stachour Secure Computing Technology Center 1210 County Road E. West, Ste 1000 Arden Hills, Minnesota Bhavani Thuraisingham The MITRE Corporation MS-Z Colshire Drive McLean, Virginia Helena Winkler Sybase Inc Christie Avenue Emeryville, California AmyWu TRW Defense Systems Group One Space Park Redondo Beach, California 90278
Using MSC/NASTRAN: Statics and Dynamics
Using MSC/NASTRAN: Statics and Dynamics A.D. Cifuentes Using MSC/NASTRAN Statics and Dynamics With 94 Illustrations Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Arturo O. Cifuentes
More informationThe MATLAB 5 Handbook
The MATLAB 5 Handbook Springer New York Berlin Heidelberg Barcelona Budapest Hong Kong London Milan Paris Singapore Tokyo Darren Redfern Colin Campbell The MATLAB 5 Handbook Springer Darren Redfern Practical
More informationVisualization in Supercomputing
Visualization in Supercomputing Raul H. Mendez Editor Visualization in Supercomputing With 166 Illustrations, 25 in Color Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Raul H.
More informationITSM: An Interactive Time Series Modelling Package for the pe
ITSM: An Interactive Time Series Modelling Package for the pe Peter J. Brockwell Richard A. Davis ITSM: An Interactive Time Series Modelling Package for the pe With 53 Illustrations and 3 Diskettes Written
More informationProgramming with Turing and Object Oriented Turing
Programming with Turing and Object Oriented Turing Peter Grogono Programming with Turing and Object Oriented Turing Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest
More informationComputer Science Workbench. Editor: Tosiyasu L. Kunii
Computer Science Workbench Editor: Tosiyasu L. Kunii H. Kitagawa T.L. Kunii The U nnortnalized Relational Data Model F or Office Form Processor Design With 78 Figures Springer-Verlag Tokyo Berlin Heidelberg
More informationComputer-Aided Design in Magnetics
Computer-Aided Design in Magnetics D. A. Lowther P. P. Silvester Computer-Aided Design in Magnetics With 84 illustrations Springer-Verlag Berlin Heidelberg New York Tokyo D. A. Lowther Associate Professor
More informationYves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC
Wavelets Made Easy Yves Nievergelt Wavelets Made Easy Springer Science+Business Media, LLC Yves Nievergelt Department of Mathematics Eastem Washington University Cheney, WA 99004-2431 USA Library of Congress
More informationGraphics Programming in c++
Graphics Programming in c++ Springer London Berlin Heidelberg New York Barcelona Budapest Hong Kong Milan Paris Santa Clara Singapore Tokyo Mark Walmsley Graphics Programming in c++ Writing Graphics Applications
More informationFOREWARD. Keith F. Brewster May 1996 Acting Chief, Partnerships and Processes
NCSC TECHNICAL REPORT - 005 Volume 5/5 Library No. S-243,039 FOREWARD This report is the fifth of five companion documents to the Trusted Database Management System interpretation of the Trusted Computer
More informationDesign and implementation of a database inference controller
Data & Knowledge Engineering 11 (1993) 271-297 271 North-Holland DATAK 180 Design and implementation of a database inference controller Bhavani Thuraisingham*, William Ford, Marie Collins and Jonathan
More informationGuide to RISC Processors
Guide to RISC Processors Sivarama P. Dandamudi Guide to RISC Processors for Programmers and Engineers Sivarama P. Dandamudi School of Computer Science Carleton University Ottawa, ON K1S 5B6 Canada sivarama@scs.carleton.ca
More informationTHE VERILOG? HARDWARE DESCRIPTION LANGUAGE
THE VERILOG? HARDWARE DESCRIPTION LANGUAGE THE VERILOGf HARDWARE DESCRIPTION LANGUAGE by Donald E. Thomas Carnegie Mellon University and Philip R. Moorby Cadence Design Systems, Inc. SPRINGER SCIENCE+BUSINESS
More informationEnhancing the Controlled Disclosure of Sensitive Information
Enhancing the Controlled Disclosure of Sensitive Information Donald G. Marks, Amihai Motro, and Sushil Jajodia Department of Information and Software Systems Engineering George Mason University Fairfax,
More informationAgile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler
Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques
More informationSystems:;-'./'--'.; r. Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington
Data base 7\,T"] Systems:;-'./'--'.; r Modelsj Languages, Design, and Application Programming Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant
More informationMultilevel relations: Schema and multiple instances based on each access class. A multilevel relation consists of two parts:
The Jajodia & Sandhu model Jajodia & Sandhu (1991), a model for the application of mandatory policies in relational database systems. Based on the sec classifications introduced in BLP. It extends the
More informationTrusted DBMS Architecture. Trusted DBMS Architecture featuring Trusted OS
Trusted DBMS Architecture featuring Trusted OS KIM, Hyung Chan Security Research Group, New Wave Computing Lab. Dept. of Information and Communications, Gwangju Institue of Science and Technology (GIST)
More informationLOGICAL DATA MODELING
LOGICAL DATA MODELING INTEGRATED SERIES IN INFORMATION SYSTEMS Professor Ramesh Sharda Oklahoma State University Series Editors Prof. Dr. Stefan VoB Universitat Hamburg Expository and Research Monographs
More informationResearch on Industrial Security Theory
Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3
More informationComputer Network Architectures and Protocols SECOND EDITION
Computer Network Architectures and Protocols SECOND EDITION Applications of Communications Theory Series Editor: R. W. Lucky, A r& T Bell Laboratories Recent volumes in the series: COMPUTER COMMUNICATIONS
More informationNorman D. Thomson Raymond P. Polivka. APL2 in Depth. Springer-Verlag. New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest
APL2 in Depth Norman D. Thomson Raymond P. Polivka APL2 in Depth Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest Nonnan D. Thomson Finnock House Cliff Terrace
More informationFundamentals of. Database Systems. Shamkant B. Navathe. College of Computing Georgia Institute of Technology PEARSON.
Fundamentals of Database Systems 5th Edition Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant B. Navathe College of Computing Georgia Institute
More informationFUNDAMENTALS OF. Database S wctpmc. Shamkant B. Navathe College of Computing Georgia Institute of Technology. Addison-Wesley
FUNDAMENTALS OF Database S wctpmc SIXTH EDITION Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant B. Navathe College of Computing Georgia Institute
More informationInteractive 3D Graphics in Windows
Interactive 3D Graphics in Windows Springer New York Berlin Heidelberg Barcelona Budapest Hong Kong London Milan Paris Tokyo Roy Hall Danielle Forsyth Springer Additional material to this book can be downloaded
More informationGeorge Grätzer. Practical L A TEX
Practical L A TEX George Grätzer Practical L A TEX 123 George Grätzer Toronto, ON, Canada Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-06424-6 ISBN
More informationARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs
ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs Vaughn Betz Jonathan Rose Alexander Marquardt
More informationTEXTS IN COMPUTER SCIENCE
TEXTS IN COMPUTER SCIENCE Editors David Gries Fred B. Schneider Springer New York Berlin Heidelberg Barcelona Hong Kong London Milan Paris Singapore Tokyo Peter Z. Revesz INTRODUCTION TO CONSTRAINT DATABASES
More informationGraph Data Model. and Its Data Language. Hideko S. Kunii. Foreword by Gio Wiederhold
Hideko S. Kunii Graph Data Model and Its Data Language Foreword by Gio Wiederhold With 35 Figures Springer-Verlag Tokyo Berlin Heidelberg New York London Paris Hong Kong HIDEKO S. KUNII General Manager
More informationWindows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla
Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4
More informationCOMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY
AFRL-IF-RS-TR-2002-61 Final Technical Report April 2002 COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY Kestrel Institute Sponsored by Defense Advanced Research Projects Agency DARPA Order
More informationEnterprise Networks and Telephony
Enterprise Networks and Telephony Springer London Berlin Heidelberg New York Barcelona Hong Kong Milan Paris Santa Clara Singapore Tokyo Solange Ghernaouti-Helie and Arnaud Dufour Enterprise Networks and
More informationModeling and Simulation in Scilab/Scicos with ScicosLab 4.4
Modeling and Simulation in Scilab/Scicos with ScicosLab 4.4 Stephen L. Campbell, Jean-Philippe Chancelier and Ramine Nikoukhah Modeling and Simulation in Scilab/Scicos with ScicosLab 4.4 Second Edition
More informationThe NeWS Book An Introduction to the Network/extensible Window System By James Gosling, David S.H. Rosenthal, and Michelle J.
SUN TECHNICAL REFERENCE LIBRARY OTHER BOOKS IN THE LIBRARY: The NeWS Book An Introduction to the Network/extensible Window System By James Gosling, David S.H. Rosenthal, and Michelle J. Arden BOOKS IN
More informationNAVAL POSTGRADUATE SCHOOL
NPS-CS-08-012 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA Use of Trusted Software Modules for High Integrity Data Display by Timothy E. Levin, Thuy N. Nguyen, Paul C. Clark, Cynthia E. Irvine, David
More informationDatabase Performance Tuning and Optimization. Using Oracle
Database Performance Tuning and Optimization Using Oracle Springer New York Berlin Heidelberg Hong Kong London Milan Paris Tokyo Sitansu S. Mittra Database Performance Tuning and Optimization Using Oracle
More informationMULTIMEDIA DATABASE MANAGEMENT SYSTEMS
MULTIMEDIA DATABASE MANAGEMENT SYSTEMS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida
More informationNational Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Sun Java System Identity Manager v5.0 Report Number: CCEVS-VR-05-0117 Dated: 6 September
More informationClustering and Information Retrieval
Clustering and Information Retrieval Network Theory and Applications Volume 11 Managing Editors: Ding-ZhuDu University o/minnesota, U.S.A. Cauligi Raghavendra University 0/ Southern Califorina, U.S.A.
More informationScheduling in Distributed Computing Systems Analysis, Design & Models
Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) by Deo Prakash
More informationSun Technical Reference Library
Sun Technical Reference Library James Gosling David S.H. Rosenthal Michelle J. Arden The NeWS Book An Introduction to the Network/extensible Window System Springer-Verlag New York Berlin Heidelberg London
More information"Charting the Course... Agile Database Design Techniques Course Summary
Course Summary Description This course provides students with the skills necessary to design databases using Agile design techniques. It is based on the Scott Ambler book Agile Database Techniques: Effective
More informationChunjie Duan Brock J. LaMeres Sunil P. Khatri. On and Off-Chip Crosstalk Avoidance in VLSI Design
Chunjie Duan Brock J. LaMeres Sunil P. Khatri On and Off-Chip Crosstalk Avoidance in VLSI Design 123 On and Off-Chip Crosstalk Avoidance in VLSI Design Chunjie Duan Brock J. LaMeres Sunil P. Khatri On
More informationAOG Systems Corporation
Some Results from the Entity/Relationship Multilevel Secure DBMS Project George E. Gajnak AOG Systems Corporation Abstract A multilevel secure version of the Entity/Relationship (Em) data model has been
More informationOpen Source Software for Digital Forensics
Open Source Software for Digital Forensics Ewa Huebner Editors Stefano Zanero Open Source Software for Digital Forensics Editors Ewa Huebner Computer Forensis Consulting, Warrimoo NSW Australia ehuebner@computerforensis.com
More informationOptical Burst Switched Networks
Optical Burst Switched Networks OPTICAL NETWORKS SERIES Series Editor Biswanath Mukherjee, University of California, Davis OPTICAL BURST SWITCHED NETWORKS JASON P. JUE The University of Texas at Dallas
More informationGuide to OSI and TCP/IP Models
SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi
More informationITIL 2011 At a Glance. John O. Long
ITIL 2011 At a Glance John O. Long SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin Shen Borko Furht VS
More informationDoD STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER
DoD 5200.28-STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA DECEMBER l985 December 26,
More informationDATA VISUALIZATION WITH FLASH BUILDER
DATA VISUALIZATION WITH FLASH BUILDER DESIGNING RIA AND AIR APPLICATIONS WITH REMOTE DATA SOURCES CESARE ROCCHI First published 2011 by Focal Press Published 2017 by Routledge 2 Park Square, Milton Park,
More informationVIDEO CODING. The Second Generation Approach
VIDEO CODING The Second Generation Approach VIDEO CODING The Second Generation Approach EDITED BY luis Torres Department of Signal Theory and Communications, Universitat Politecnica de Catalunya Barcelona,
More informationIntroduction to Relational Databases. Introduction to Relational Databases cont: Introduction to Relational Databases cont: Relational Data structure
Databases databases Terminology of relational model Properties of database relations. Relational Keys. Meaning of entity integrity and referential integrity. Purpose and advantages of views. The relational
More informationDesigning Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran
More informationAlgorithms for Discrete Fourier Transform and Convolution
Algorithms for Discrete Fourier Transform and Convolution Second Edition Springer Science+Business Media, LLC Signal Processing and Digital Filtering Synthetic Aperture Radar J.P. Fitch Multiplicative
More informationPhilip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition
FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7
More informationAn Introduction to Programming with IDL
An Introduction to Programming with IDL Interactive Data Language Kenneth P. Bowman Department of Atmospheric Sciences Texas A&M University AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN
More informationModeling & Simulation-Based Data Engineering
Modeling & Simulation-Based Data Engineering Modeling & Simulation- Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange Bernard P. Zeigler Phillip E. Hammonds
More informationFUZZY LOGIC WITH ENGINEERING APPLICATIONS
FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition Timothy J. Ross University of New Mexico, USA A John Wiley and Sons, Ltd., Publication FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition FUZZY
More informationThe Architectural Logic of Database Systems
The Architectural Logic of Database Systems E. J. Yannakoudakis The Architectural Logic of Database Systems With 69 Figures Springer-Verlag london Berlin Heidelberg New York Paris Tokyo E. 1. Yannakoudakis,
More informationSpringer Books on Professional Computing. Edited by Henry Ledgard
Springer Books on Professional Computing Edited by Henry Ledgard Springer Books on Professional Computing Computer Confidence: A Human Approach to Computers Bruce D. Sanders. viii, 90 pages. 23 figures.
More informationOpen Geometry: OpenGL + Advanced Geometry
Open Geometry: OpenGL + Advanced Geometry Springer-Science+Business Media, LLC Open Geometry: OpenGL + Advanced Geometry Georg Glaeser Hellmuth Stachel Springer Georg G laeser University of Applied Arts,
More informationINFORMATION RETRIEVAL SYSTEMS: Theory and Implementation
INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Series Editor W. Bruce Croft University of Massachusetts Amherst, MA 01003 Also in the
More informationBusiness Intelligence Roadmap HDT923 Three Days
Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are
More informationMULTIMEDIA TOOLS AND APPLICATIONS
MULTIMEDIA TOOLS AND APPLICATIONS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida
More informationDigital Preservation Metadata for Practitioners
Digital Preservation Metadata for Practitioners Angela Dappert Rebecca Squire Guenther Sébastien Peyrard Editors Digital Preservation Metadata for Practitioners Implementing PREMIS 123 Editors Angela Dappert
More informationStock Message Boards
Stock Message Boards This page intentionally left blank Stock Message Boards A Quantitative Approach to Measuring Investor Sentiment Ying Zhang STOCK MESSAGE BOARDS Copyright Ying Zhang, 2014. Softcover
More informationThe Information Retrieval Series. Series Editor W. Bruce Croft
The Information Retrieval Series Series Editor W. Bruce Croft Sándor Dominich The Modern Algebra of Information Retrieval 123 Sándor Dominich Computer Science Department University of Pannonia Egyetem
More informationC++ Quick Syntax Reference
C++ Quick Syntax Reference Mikael Olsson C++ Quick Syntax Reference Copyright 2013 by Mikael Olsson This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
More informationComputers as Components Principles of Embedded Computing System Design
Computers as Components Principles of Embedded Computing System Design Third Edition Marilyn Wolf ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY
More informationCourse Introduction & Foundational Concepts
Course Introduction & Foundational Concepts CPS 352: Database Systems Simon Miner Gordon College Last Revised: 8/30/12 Agenda Introductions Course Syllabus Databases Why What Terminology and Concepts Design
More informationNational Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Xceedium Gatekeeper Version 3.6 Report Number: CCEVS-VR-06-0048 Dated: 31 October 2006 Version:
More informationDatabase Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design
Database Systems: Design, Implementation, and Management Tenth Edition Chapter 9 Database Design Objectives In this chapter, you will learn: That successful database design must reflect the information
More informationSYMBOLIC COMPUTATION. Managing Editors: J. Encama~o P. Hayes Artificial Intelligence Editors: L. Bole A Bundy J. Siekmann
SYMBOLIC COMPUTATION Managing Editors: J. Encama~o P. Hayes Artificial Intelligence Editors: L. Bole A Bundy J. Siekmann The Design of Interpreters, Compilers, and Editors for Augmented Transition Networks
More informationLecture Notes in Computer Science
L.. Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 60 M. J. Flynn, J. N. Gray, A. K. Jones, K. Lagally H. Opderbeck, G. J. Popek, B. Randell J. H. Saltzer, H. R. Wiehle Operating
More informationMULTILEVEL SECURITY FOR KNOWLEDGE BASED SYSTEMS
AD-A234 974 RADC-TR-90-406 Final Technical Report December 1990 MULTILEVEL SECURITY FOR KNOWLEDGE BASED SYSTEMS SRI international Teresa F. Lunt and Thomas D. Garvey APPROVED FOR PUBLIC RELEASe" DISTRIBUTION
More informationConvex Analysis and Minimization Algorithms I
Jean-Baptiste Hiriart-Urruty Claude Lemarechal Convex Analysis and Minimization Algorithms I Fundamentals With 113 Figures Springer-Verlag Berlin Heidelberg New York London Paris Tokyo Hong Kong Barcelona
More informationCambridge University Press The Elements of UML 2.0 Style Scott W. Ambler Frontmatter More information. The Elements. UML TM2.
The Elements of UML TM2.0 Style For Beverley The Elements of UML TM2.0 Style CAMBRIDGE UNIVERSITY PRESS Cambridge,NewYork,Melbourne,Madrid,CapeTown,Singapore,SãoPaulo Cambridge University Press 40 West
More information"Charting the Course... MOC C: Developing SQL Databases. Course Summary
Course Summary Description This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL database. The course focuses on teaching individuals how to use
More informationFunctional Programming in R
Functional Programming in R Advanced Statistical Programming for Data Science, Analysis and Finance Thomas Mailund Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis
More informationPart I: Data Mining Foundations
Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?
More informationObjective-C Quick Syntax Reference
Objective-C Quick Syntax Reference Matthew Campbell Objective-C Quick Syntax Reference Copyright 2014 by Matthew Campbell This work is subject to copyright. All rights are reserved by the Publisher, whether
More informationEssential Angular for ASP.NET Core MVC
Essential Angular for ASP.NET Core MVC Adam Freeman Essential Angular for ASP.NET Core MVC Adam Freeman London, UK ISBN-13 (pbk): 978-1-4842-2915-6 ISBN-13 (electronic): 978-1-4842-2916-3 DOI 10.1007/978-1-4842-2916-3
More informationDatabase Security Overview. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Database Security Overview Murat Kantarcioglu Topics The access control model of System R Extensions to the System R model Views and content-based
More informationXML for Bioinformatics
XML for Bioinformatics Ethan Cerami XML for Bioinformatics Library of Congress Cataloging-in-Publication Data Cerami, Ethan. XML for bioinformatics / Ethan Cerami. p. cm. Includes bibliographical references
More information[19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No.
[19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No. 1 (March 1976), 9-36. [20] J. Biskup, H. H. Brüggemann. Das datenschutzorientierte
More informationABSTRACT 1. INTRODUCTION
SECURITY CONSTRAINT PROCESSING DURING THE UPDATE OPERATION IN A MULTILEVEL SECURE DATABASE MANAGEMENT SYSTEM Marie Collins, William Ford, and Bhavani Thuraisingham The MITRE Corporation, Burlington Road,
More informationEncyclopedia of Information Science and Technology
Encyclopedia of Information Science and Technology Second Edition Mehdi Khosrow-Pour Information Resources Management Association, USA Volume IV G-Internet INFORMATION SCIENCE REFERENCE Hershey New York
More informationC++ Programming for Programmers
C++ Programming for Programmers Compiled and Presented by Thomas P. Sturm, Ph.D. Graduate Programs in Software Technical Seminar The University of St. Thomas St. Paul, Minnesota Copyright 1992, 1993, 1994,
More informationInformation Modeling and Relational Databases
Information Modeling and Relational Databases Second Edition Terry Halpin Neumont University Tony Morgan Neumont University AMSTERDAM» BOSTON. HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
More informationLow Level X Window Programming
Low Level X Window Programming Ross J. Maloney Low Level X Window Programming An Introduction by Examples 123 Dr. Ross J. Maloney Yenolam Corporation Booragoon, WA Australia ISBN 978-3-319-74249-6 ISBN
More informationSpecific Objectives Contents Teaching Hours 4 the basic concepts 1.1 Concepts of Relational Databases
Course Title: Advanced Database Management System Course No. : ICT. Ed 525 Nature of course: Theoretical + Practical Level: M.Ed. Credit Hour: 3(2T+1P) Semester: Second Teaching Hour: 80(32+8) 1. Course
More informationThe Semantic Web Explained
The Semantic Web Explained The Semantic Web is a new area of research and development in the field of computer science, aimed at making it easier for computers to process the huge amount of information
More informationFailure-Modes-Based Software Reading
SPRINGER BRIEFS IN COMPUTER SCIENCE Yang-Ming Zhu Failure-Modes-Based Software Reading SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Yang-Ming
More informationC Quick Syntax Reference
C Quick Syntax Reference Mikael Olsson C Quick Syntax Reference Copyright 2015 by Mikael Olsson This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
More informationStefan Waldmann. Topology. An Introduction
Topology Stefan Waldmann Topology An Introduction 123 Stefan Waldmann Julius Maximilian University of Würzburg Würzburg Germany ISBN 978-3-319-09679-7 ISBN 978-3-319-09680-3 (ebook) DOI 10.1007/978-3-319-09680-3
More informationNational Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Extended Package for Secure Shell, Version 1.0, February 19, 2016 Report Number: CCEVS-VR-PP-0039
More informationPractical Database Design Methodology and Use of UML Diagrams Design & Analysis of Database Systems
Practical Database Design Methodology and Use of UML Diagrams 406.426 Design & Analysis of Database Systems Jonghun Park jonghun@snu.ac.kr Dept. of Industrial Engineering Seoul National University chapter
More informationTowards Formal Evaluation of a High-Assurance Guard
Towards Formal Evaluation of a High-Assurance Guard Mark R. Heckman Roger R. Schell Edwards E. Reed 2012 Layered Assurance Workshop,
More informationJava Quick Syntax Reference. Second Edition. Mikael Olsson
Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Mikael Olsson Hammarland, Länsi-Suomi, Finland ISBN-13 (pbk):
More information