Research Directions in Database Security

Size: px
Start display at page:

Download "Research Directions in Database Security"

Transcription

1 Research Directions in Database Security

2 Teresa F. Lunt Editor Research Directions in Database Security With 16 Illustrations Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest

3 Teresa F. Lunt Program Manager Secure Systems SRI International 333 Ravenswood Avenue Menlo Park, CA USA Library of Congress Cataloging-in-Publication Data Research directions in database security / Teresa F. Lunt, editor p. cm. Discussions of topics presented at a workshop held at the Vallombrosa Conference and Retreat Center, Menlo Park, Calif., May 24-26, 1988, sponsored by the US Air Force, Rome Air Development Center. Includes bibliographical references and index. 1. Data base security--congresses. 1. Lunt, Teresa F. II. Rome Air Development Center. QA76.9.D314R dc Printed on acid-free paper Springer-Verlag New York, Inc. Softcover reprint of the hardcover 1st edition 1992 All rights reserved. This work may not be translated or copied in whole or in part without the written permission ofthe publisher (Springer-Verlag New York, Inc., 175 Fifth Avenue, New York, NY 10010, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use of general descriptive names, trade names, trademarks, etc., in this publication, even if the former are not especially identified, is not to be taken as a sign that such names, as understood by the Trade Marks and Merchandise Marks Act, may accordingly be used freely by anyone. Production managed by Karen Phillips; manufacturing supervised by Robert Paella. Photocomposed pages prepared from the editor's LATEX file ISBN-13: DOl: / e-isbn-13:

4 Contributors 1 Workshop Summary TERESA F. LUNT 1.1 Introduction. 1.2 Labels Aggregation. Discretionary Security The Homework Problem Classification Semantics Assurance Balanced Assurance TCB Subsetting Layered TCB. New Approaches... Classifying Metadata. Conclusions References. 2 SeaView TERESA F. LUNT 2.1 Introduction. 2.2 Multilevel Security 2.3 Multilevel Relations The Extended Relational Integrity Rules Polyinstantiation Constraints Discretionary Security 2.5 Multilevel SQL The Access Class Data Type Dealing with Polyinstantiation Creating Multilevel Relations 2.6 The SeaView Verification.... xiii

5 vi 2.7 The SeaView Design 2.8 Data Design Considerations 2.9 Conclusions 2.10 References Al Secure DBMS Architecture 33 THOMAS H. HINKE, CRISTI GARVEY, AND AMY Wu 3.1 Introduction The Al Secure DBMS Modes of Operation The Al Secure DBMS Security Policy Overview Al Secure DBMS Architecture Why is ASD Needed? For Further Information References An Investigation of Secure Distributed DBMS Architectures 41 JAMES P. O'CONNOR, JAMES W. GRAY III, CATHERINE MCCOLLUM, AND LouAANNA NOTARGIACOMO 4.1 Introduction Background Requirements Concept of Operation Users Security Policy Overview Discretionary Access Control Mandatory Access Control Architecture Definition Abstract Model Architectural Parameters Family of Architecture Generation Discretionary Access Control Enforcement Summary and Conclusions References LOCK Data Views 63 PAUL STACHOUR 5.1 Introduction Problem Statement Security Policy Overview LOCK Security Policy Overview DBMS Policy Extension Needs DBMS Policy Extensions Pipelines The Response Pipeline Design 69

6 vii LOCK Pipeline Organization Response Pipeline Organization Pipeline Implications. 5.4 Conclusions 5.5 References Sybase Secure SQL Server 81 HELENA WINKLER 6.1 Introduction Terms and Definitions Objectives B2 Design Philosophy Database Server On A Network B2 Sybase Secure SQL Server Flow of Control Login Parsing and Compilation Description of Procedures Execution of Procedures Trusted Operations SSO Trusted Interface User - Trusted Interface Auditing Conclusions An Evolution of Views 91 DOROTHY E. DENNING 7.1 Introduction References Discussion: Pros and Cons of the Various Approaches 97 DOROTHY E. DENNING AND WILLIAM R. SHOCKLEY 8.1 Introduction Inference Problem Aggregation Problem Problem Instances Two Approaches Retrospective References The Homework Problem 105 RAE K. BURNS

7 viii 10 Report on the Homework Problem RAE K. BURNS 10.1 Introduction The Example Database 10.3 Summary Classifying and Downgrading: Is a Human Needed in the Loop? 125 GARY W. SMITH 11.1 Introduction Underlying Concepts Classifying Outputs Semantic Level Approach Classifying and Downgrading The Issue The Answer Structured Data Security Semantics of an Application Types of Security Semantics Textual Data Summary References Session Report: The Semantics of Data Classification 135 GARY W. SMITH 12.1 Introduction References Inference and Aggregation 143 MATTHEW MORGENSTERN, TOM HINKE, AND BHAVANI THURAISINGHAM 13.1 Introduction Database Inference The Problem A Solution Approach The Inference Problem Analysis of Logical Inference Problems When Classifying a Rule is Worse than Useless Sphere of Influence Analysis Network of Constraints Questions General Discussion References

8 ix 14 Dynamic Classification and Automatic Sanitization 161 MARVIN SCHAEFER 14.1 Introduction Sanitization Initial Overclassification Initial Underclassification Discovered Misclassification Automatic Classification References Presentation and Discussion on Balanced Assurance 167 WILLIAM R. SHOCKLEY 15.1 Introduction References Some Results from the Entity/Relationship Multilevel Secure DBMS Project 173 GEORGE E. GAJNAK 16.1 Project Goals and Assumptions A Multilevel Entity/Relationship Model Data Model Semantics Multilevel Security Characteristics Results of Research The Underlying Abstraction Conclusions References Designing a Trusted Application Using an Object-Oriented Data Model 191 CATHERINE MEADOWS AND CARL LANDWEHR 17.1 Introduction The Object-Oriented Data Model The SMMS as an Object-Oriented Database Conclusion and Future Directions References Foundations of Multilevel Databases 199 BHAVANI THURAISINGHAM 18.1 Introduction Definitional Preliminaries Model Theoretic Approach Query Evaluation Database Updates Proof Theoretic Approach Query Evaluation. 209

9 x Database Updates Environments and Fixed Points Environments Mappings Fixed Points Least Environment Declarative and Procedural Semantics Environments and Inference Handling Negative and Indefinite Information Closed-World Assumption Negation by Failure Formal Semantics of Time Other Related Topics Theory of Relational Databases Consistency and Completeness of Security Constraints Assigning Security Levels to Data Conclusion References An Application Perspective on DBMS Security Policies 227 RAE K. BURNS 19.1 Introduction Problems with Automatic Polyinstantiation Polyinstantiation and Entity Integrity Polyinstantiation and Referential Integrity Polyinstantiation verses Application Consistency Problems with Simplistic Mandatory Policies Problems with View-Based Controls and Constraints Requirement for Transaction Authorizations Summary References New Approaches to Database Security: Report on Discussion 235 CATHERINE MEADOWS 20.1 Introduction Report on Discussion Open Problems in Computer Security Old Problems for Operating Systems but New Problems for Database Systems Database-Specific Problems Challenge Posed by Advances in Database Technology Conclusion References

10 21 Metadata and View Classification LouANNA NOTARGIACOMO 21.1 Introduction Justification for Metadata Protection Metadata Classification Approaches Internal Schema Conceptual Schema External Schema Metadata Protection Schemes 21.5 User Access to Metadata Affect of User Session Level on Data Classification 22 Database Security Research at NCSC JOHN R. CAMPBELL 22.1 Introduction Sponsored Research Projects 22.3 The Future Discussion Topics Position Paper on DBMS Security JOSEPH GIORDANO 23.1 Introduction Conclusions Index Xl

11 Contributors Rae K. Burns The MITRE Corporation Burlington Road Bedford, Massachusetts John R. Campbell National Computer Security Center 9800 Savage Road Fort Meade, Maryland Dorothy E. Denning Georgetown University 225 Reiss Science Building Washington, DC George E. Gajnak DEC 151 Taylor Street TAY1 Littleton, Massachusetts Cristi Garvey TRW Defense Systems Group One Space Park Redondo Beach, California Joseph Giordano Rome Laboratory Griffiss Air Force Base Rome, New York James W. Gray III Naval Research Laboratory Washington, DC Thomas H. Hinke Computer Science Department University of Alabama in Huntsville Computer Science Building Huntsville, Alabama Carl Landwehr Office of Research and Development Center for Secure Information Technology Naval Research Laboratory Washington, DC Teresa F. Lunt SRI International, Computer Science Laboratory 333 Ravenswood Avenue Menlo Park, California Catherine McCollum Unisys 8201 Greensboro Drive, Ste 1000 McLean, Virginia Catherine Meadows Office of Research and Development Center for Secure Information Technology Naval Research Laboratory Washington, DC

12 xiv Contributors Matthew Morgenstern Xerox Advanced Information Technology 4 Cambridge Center Cambridge, Massachusetts LouAnna Notargiacomo The MITRE Corporation 7525 Colshire Drive McLean, Virginia James P. O'Connor Software Productivity Consortium Rock Hill Road Herndon, Virginia Marvin Schaefer Trusted Information Systems, Inc Washington Road Route 97 Glenwood, Maryland William R. Shockley DEC TP West 800 West El Camino Real Mountain View, California LTC Gary W. Smith IBM College DOD Computer Institute Washington Navy Yard, Bldg. 175 Washington, DC Paul Stachour Secure Computing Technology Center 1210 County Road E. West, Ste 1000 Arden Hills, Minnesota Bhavani Thuraisingham The MITRE Corporation MS-Z Colshire Drive McLean, Virginia Helena Winkler Sybase Inc Christie Avenue Emeryville, California AmyWu TRW Defense Systems Group One Space Park Redondo Beach, California 90278

Using MSC/NASTRAN: Statics and Dynamics

Using MSC/NASTRAN: Statics and Dynamics Using MSC/NASTRAN: Statics and Dynamics A.D. Cifuentes Using MSC/NASTRAN Statics and Dynamics With 94 Illustrations Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Arturo O. Cifuentes

More information

The MATLAB 5 Handbook

The MATLAB 5 Handbook The MATLAB 5 Handbook Springer New York Berlin Heidelberg Barcelona Budapest Hong Kong London Milan Paris Singapore Tokyo Darren Redfern Colin Campbell The MATLAB 5 Handbook Springer Darren Redfern Practical

More information

Visualization in Supercomputing

Visualization in Supercomputing Visualization in Supercomputing Raul H. Mendez Editor Visualization in Supercomputing With 166 Illustrations, 25 in Color Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Raul H.

More information

ITSM: An Interactive Time Series Modelling Package for the pe

ITSM: An Interactive Time Series Modelling Package for the pe ITSM: An Interactive Time Series Modelling Package for the pe Peter J. Brockwell Richard A. Davis ITSM: An Interactive Time Series Modelling Package for the pe With 53 Illustrations and 3 Diskettes Written

More information

Programming with Turing and Object Oriented Turing

Programming with Turing and Object Oriented Turing Programming with Turing and Object Oriented Turing Peter Grogono Programming with Turing and Object Oriented Turing Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest

More information

Computer Science Workbench. Editor: Tosiyasu L. Kunii

Computer Science Workbench. Editor: Tosiyasu L. Kunii Computer Science Workbench Editor: Tosiyasu L. Kunii H. Kitagawa T.L. Kunii The U nnortnalized Relational Data Model F or Office Form Processor Design With 78 Figures Springer-Verlag Tokyo Berlin Heidelberg

More information

Computer-Aided Design in Magnetics

Computer-Aided Design in Magnetics Computer-Aided Design in Magnetics D. A. Lowther P. P. Silvester Computer-Aided Design in Magnetics With 84 illustrations Springer-Verlag Berlin Heidelberg New York Tokyo D. A. Lowther Associate Professor

More information

Yves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC

Yves Nievergelt. Wavelets Made Easy. Springer Science+Business Media, LLC Wavelets Made Easy Yves Nievergelt Wavelets Made Easy Springer Science+Business Media, LLC Yves Nievergelt Department of Mathematics Eastem Washington University Cheney, WA 99004-2431 USA Library of Congress

More information

Graphics Programming in c++

Graphics Programming in c++ Graphics Programming in c++ Springer London Berlin Heidelberg New York Barcelona Budapest Hong Kong Milan Paris Santa Clara Singapore Tokyo Mark Walmsley Graphics Programming in c++ Writing Graphics Applications

More information

FOREWARD. Keith F. Brewster May 1996 Acting Chief, Partnerships and Processes

FOREWARD. Keith F. Brewster May 1996 Acting Chief, Partnerships and Processes NCSC TECHNICAL REPORT - 005 Volume 5/5 Library No. S-243,039 FOREWARD This report is the fifth of five companion documents to the Trusted Database Management System interpretation of the Trusted Computer

More information

Design and implementation of a database inference controller

Design and implementation of a database inference controller Data & Knowledge Engineering 11 (1993) 271-297 271 North-Holland DATAK 180 Design and implementation of a database inference controller Bhavani Thuraisingham*, William Ford, Marie Collins and Jonathan

More information

Guide to RISC Processors

Guide to RISC Processors Guide to RISC Processors Sivarama P. Dandamudi Guide to RISC Processors for Programmers and Engineers Sivarama P. Dandamudi School of Computer Science Carleton University Ottawa, ON K1S 5B6 Canada sivarama@scs.carleton.ca

More information

THE VERILOG? HARDWARE DESCRIPTION LANGUAGE

THE VERILOG? HARDWARE DESCRIPTION LANGUAGE THE VERILOG? HARDWARE DESCRIPTION LANGUAGE THE VERILOGf HARDWARE DESCRIPTION LANGUAGE by Donald E. Thomas Carnegie Mellon University and Philip R. Moorby Cadence Design Systems, Inc. SPRINGER SCIENCE+BUSINESS

More information

Enhancing the Controlled Disclosure of Sensitive Information

Enhancing the Controlled Disclosure of Sensitive Information Enhancing the Controlled Disclosure of Sensitive Information Donald G. Marks, Amihai Motro, and Sushil Jajodia Department of Information and Software Systems Engineering George Mason University Fairfax,

More information

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques

More information

Systems:;-'./'--'.; r. Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington

Systems:;-'./'--'.; r. Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Data base 7\,T"] Systems:;-'./'--'.; r Modelsj Languages, Design, and Application Programming Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant

More information

Multilevel relations: Schema and multiple instances based on each access class. A multilevel relation consists of two parts:

Multilevel relations: Schema and multiple instances based on each access class. A multilevel relation consists of two parts: The Jajodia & Sandhu model Jajodia & Sandhu (1991), a model for the application of mandatory policies in relational database systems. Based on the sec classifications introduced in BLP. It extends the

More information

Trusted DBMS Architecture. Trusted DBMS Architecture featuring Trusted OS

Trusted DBMS Architecture. Trusted DBMS Architecture featuring Trusted OS Trusted DBMS Architecture featuring Trusted OS KIM, Hyung Chan Security Research Group, New Wave Computing Lab. Dept. of Information and Communications, Gwangju Institue of Science and Technology (GIST)

More information

LOGICAL DATA MODELING

LOGICAL DATA MODELING LOGICAL DATA MODELING INTEGRATED SERIES IN INFORMATION SYSTEMS Professor Ramesh Sharda Oklahoma State University Series Editors Prof. Dr. Stefan VoB Universitat Hamburg Expository and Research Monographs

More information

Research on Industrial Security Theory

Research on Industrial Security Theory Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3

More information

Computer Network Architectures and Protocols SECOND EDITION

Computer Network Architectures and Protocols SECOND EDITION Computer Network Architectures and Protocols SECOND EDITION Applications of Communications Theory Series Editor: R. W. Lucky, A r& T Bell Laboratories Recent volumes in the series: COMPUTER COMMUNICATIONS

More information

Norman D. Thomson Raymond P. Polivka. APL2 in Depth. Springer-Verlag. New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest

Norman D. Thomson Raymond P. Polivka. APL2 in Depth. Springer-Verlag. New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest APL2 in Depth Norman D. Thomson Raymond P. Polivka APL2 in Depth Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest Nonnan D. Thomson Finnock House Cliff Terrace

More information

Fundamentals of. Database Systems. Shamkant B. Navathe. College of Computing Georgia Institute of Technology PEARSON.

Fundamentals of. Database Systems. Shamkant B. Navathe. College of Computing Georgia Institute of Technology PEARSON. Fundamentals of Database Systems 5th Edition Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant B. Navathe College of Computing Georgia Institute

More information

FUNDAMENTALS OF. Database S wctpmc. Shamkant B. Navathe College of Computing Georgia Institute of Technology. Addison-Wesley

FUNDAMENTALS OF. Database S wctpmc. Shamkant B. Navathe College of Computing Georgia Institute of Technology. Addison-Wesley FUNDAMENTALS OF Database S wctpmc SIXTH EDITION Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant B. Navathe College of Computing Georgia Institute

More information

Interactive 3D Graphics in Windows

Interactive 3D Graphics in Windows Interactive 3D Graphics in Windows Springer New York Berlin Heidelberg Barcelona Budapest Hong Kong London Milan Paris Tokyo Roy Hall Danielle Forsyth Springer Additional material to this book can be downloaded

More information

George Grätzer. Practical L A TEX

George Grätzer. Practical L A TEX Practical L A TEX George Grätzer Practical L A TEX 123 George Grätzer Toronto, ON, Canada Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-06424-6 ISBN

More information

ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs

ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE ARCHITECTURE AND CAD FOR DEEP-SUBMICRON FPGAs Vaughn Betz Jonathan Rose Alexander Marquardt

More information

TEXTS IN COMPUTER SCIENCE

TEXTS IN COMPUTER SCIENCE TEXTS IN COMPUTER SCIENCE Editors David Gries Fred B. Schneider Springer New York Berlin Heidelberg Barcelona Hong Kong London Milan Paris Singapore Tokyo Peter Z. Revesz INTRODUCTION TO CONSTRAINT DATABASES

More information

Graph Data Model. and Its Data Language. Hideko S. Kunii. Foreword by Gio Wiederhold

Graph Data Model. and Its Data Language. Hideko S. Kunii. Foreword by Gio Wiederhold Hideko S. Kunii Graph Data Model and Its Data Language Foreword by Gio Wiederhold With 35 Figures Springer-Verlag Tokyo Berlin Heidelberg New York London Paris Hong Kong HIDEKO S. KUNII General Manager

More information

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4

More information

COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY

COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY AFRL-IF-RS-TR-2002-61 Final Technical Report April 2002 COMPOSABILITY, PROVABILITY, REUSABILITY (CPR) FOR SURVIVABILITY Kestrel Institute Sponsored by Defense Advanced Research Projects Agency DARPA Order

More information

Enterprise Networks and Telephony

Enterprise Networks and Telephony Enterprise Networks and Telephony Springer London Berlin Heidelberg New York Barcelona Hong Kong Milan Paris Santa Clara Singapore Tokyo Solange Ghernaouti-Helie and Arnaud Dufour Enterprise Networks and

More information

Modeling and Simulation in Scilab/Scicos with ScicosLab 4.4

Modeling and Simulation in Scilab/Scicos with ScicosLab 4.4 Modeling and Simulation in Scilab/Scicos with ScicosLab 4.4 Stephen L. Campbell, Jean-Philippe Chancelier and Ramine Nikoukhah Modeling and Simulation in Scilab/Scicos with ScicosLab 4.4 Second Edition

More information

The NeWS Book An Introduction to the Network/extensible Window System By James Gosling, David S.H. Rosenthal, and Michelle J.

The NeWS Book An Introduction to the Network/extensible Window System By James Gosling, David S.H. Rosenthal, and Michelle J. SUN TECHNICAL REFERENCE LIBRARY OTHER BOOKS IN THE LIBRARY: The NeWS Book An Introduction to the Network/extensible Window System By James Gosling, David S.H. Rosenthal, and Michelle J. Arden BOOKS IN

More information

NAVAL POSTGRADUATE SCHOOL

NAVAL POSTGRADUATE SCHOOL NPS-CS-08-012 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA Use of Trusted Software Modules for High Integrity Data Display by Timothy E. Levin, Thuy N. Nguyen, Paul C. Clark, Cynthia E. Irvine, David

More information

Database Performance Tuning and Optimization. Using Oracle

Database Performance Tuning and Optimization. Using Oracle Database Performance Tuning and Optimization Using Oracle Springer New York Berlin Heidelberg Hong Kong London Milan Paris Tokyo Sitansu S. Mittra Database Performance Tuning and Optimization Using Oracle

More information

MULTIMEDIA DATABASE MANAGEMENT SYSTEMS

MULTIMEDIA DATABASE MANAGEMENT SYSTEMS MULTIMEDIA DATABASE MANAGEMENT SYSTEMS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Sun Java System Identity Manager v5.0 Report Number: CCEVS-VR-05-0117 Dated: 6 September

More information

Clustering and Information Retrieval

Clustering and Information Retrieval Clustering and Information Retrieval Network Theory and Applications Volume 11 Managing Editors: Ding-ZhuDu University o/minnesota, U.S.A. Cauligi Raghavendra University 0/ Southern Califorina, U.S.A.

More information

Scheduling in Distributed Computing Systems Analysis, Design & Models

Scheduling in Distributed Computing Systems Analysis, Design & Models Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) by Deo Prakash

More information

Sun Technical Reference Library

Sun Technical Reference Library Sun Technical Reference Library James Gosling David S.H. Rosenthal Michelle J. Arden The NeWS Book An Introduction to the Network/extensible Window System Springer-Verlag New York Berlin Heidelberg London

More information

"Charting the Course... Agile Database Design Techniques Course Summary

Charting the Course... Agile Database Design Techniques Course Summary Course Summary Description This course provides students with the skills necessary to design databases using Agile design techniques. It is based on the Scott Ambler book Agile Database Techniques: Effective

More information

Chunjie Duan Brock J. LaMeres Sunil P. Khatri. On and Off-Chip Crosstalk Avoidance in VLSI Design

Chunjie Duan Brock J. LaMeres Sunil P. Khatri. On and Off-Chip Crosstalk Avoidance in VLSI Design Chunjie Duan Brock J. LaMeres Sunil P. Khatri On and Off-Chip Crosstalk Avoidance in VLSI Design 123 On and Off-Chip Crosstalk Avoidance in VLSI Design Chunjie Duan Brock J. LaMeres Sunil P. Khatri On

More information

AOG Systems Corporation

AOG Systems Corporation Some Results from the Entity/Relationship Multilevel Secure DBMS Project George E. Gajnak AOG Systems Corporation Abstract A multilevel secure version of the Entity/Relationship (Em) data model has been

More information

Open Source Software for Digital Forensics

Open Source Software for Digital Forensics Open Source Software for Digital Forensics Ewa Huebner Editors Stefano Zanero Open Source Software for Digital Forensics Editors Ewa Huebner Computer Forensis Consulting, Warrimoo NSW Australia ehuebner@computerforensis.com

More information

Optical Burst Switched Networks

Optical Burst Switched Networks Optical Burst Switched Networks OPTICAL NETWORKS SERIES Series Editor Biswanath Mukherjee, University of California, Davis OPTICAL BURST SWITCHED NETWORKS JASON P. JUE The University of Texas at Dallas

More information

Guide to OSI and TCP/IP Models

Guide to OSI and TCP/IP Models SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi

More information

ITIL 2011 At a Glance. John O. Long

ITIL 2011 At a Glance. John O. Long ITIL 2011 At a Glance John O. Long SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin Shen Borko Furht VS

More information

DoD STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER

DoD STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER DoD 5200.28-STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA DECEMBER l985 December 26,

More information

DATA VISUALIZATION WITH FLASH BUILDER

DATA VISUALIZATION WITH FLASH BUILDER DATA VISUALIZATION WITH FLASH BUILDER DESIGNING RIA AND AIR APPLICATIONS WITH REMOTE DATA SOURCES CESARE ROCCHI First published 2011 by Focal Press Published 2017 by Routledge 2 Park Square, Milton Park,

More information

VIDEO CODING. The Second Generation Approach

VIDEO CODING. The Second Generation Approach VIDEO CODING The Second Generation Approach VIDEO CODING The Second Generation Approach EDITED BY luis Torres Department of Signal Theory and Communications, Universitat Politecnica de Catalunya Barcelona,

More information

Introduction to Relational Databases. Introduction to Relational Databases cont: Introduction to Relational Databases cont: Relational Data structure

Introduction to Relational Databases. Introduction to Relational Databases cont: Introduction to Relational Databases cont: Relational Data structure Databases databases Terminology of relational model Properties of database relations. Relational Keys. Meaning of entity integrity and referential integrity. Purpose and advantages of views. The relational

More information

Designing Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran

More information

Algorithms for Discrete Fourier Transform and Convolution

Algorithms for Discrete Fourier Transform and Convolution Algorithms for Discrete Fourier Transform and Convolution Second Edition Springer Science+Business Media, LLC Signal Processing and Digital Filtering Synthetic Aperture Radar J.P. Fitch Multiplicative

More information

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7

More information

An Introduction to Programming with IDL

An Introduction to Programming with IDL An Introduction to Programming with IDL Interactive Data Language Kenneth P. Bowman Department of Atmospheric Sciences Texas A&M University AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN

More information

Modeling & Simulation-Based Data Engineering

Modeling & Simulation-Based Data Engineering Modeling & Simulation-Based Data Engineering Modeling & Simulation- Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange Bernard P. Zeigler Phillip E. Hammonds

More information

FUZZY LOGIC WITH ENGINEERING APPLICATIONS

FUZZY LOGIC WITH ENGINEERING APPLICATIONS FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition Timothy J. Ross University of New Mexico, USA A John Wiley and Sons, Ltd., Publication FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition FUZZY

More information

The Architectural Logic of Database Systems

The Architectural Logic of Database Systems The Architectural Logic of Database Systems E. J. Yannakoudakis The Architectural Logic of Database Systems With 69 Figures Springer-Verlag london Berlin Heidelberg New York Paris Tokyo E. 1. Yannakoudakis,

More information

Springer Books on Professional Computing. Edited by Henry Ledgard

Springer Books on Professional Computing. Edited by Henry Ledgard Springer Books on Professional Computing Edited by Henry Ledgard Springer Books on Professional Computing Computer Confidence: A Human Approach to Computers Bruce D. Sanders. viii, 90 pages. 23 figures.

More information

Open Geometry: OpenGL + Advanced Geometry

Open Geometry: OpenGL + Advanced Geometry Open Geometry: OpenGL + Advanced Geometry Springer-Science+Business Media, LLC Open Geometry: OpenGL + Advanced Geometry Georg Glaeser Hellmuth Stachel Springer Georg G laeser University of Applied Arts,

More information

INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation

INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Series Editor W. Bruce Croft University of Massachusetts Amherst, MA 01003 Also in the

More information

Business Intelligence Roadmap HDT923 Three Days

Business Intelligence Roadmap HDT923 Three Days Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are

More information

MULTIMEDIA TOOLS AND APPLICATIONS

MULTIMEDIA TOOLS AND APPLICATIONS MULTIMEDIA TOOLS AND APPLICATIONS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE MULTIMEDIA SYSTEMS AND APPLICATIONS Recently Published Titles: Consulting Editor Borko Furht Florida

More information

Digital Preservation Metadata for Practitioners

Digital Preservation Metadata for Practitioners Digital Preservation Metadata for Practitioners Angela Dappert Rebecca Squire Guenther Sébastien Peyrard Editors Digital Preservation Metadata for Practitioners Implementing PREMIS 123 Editors Angela Dappert

More information

Stock Message Boards

Stock Message Boards Stock Message Boards This page intentionally left blank Stock Message Boards A Quantitative Approach to Measuring Investor Sentiment Ying Zhang STOCK MESSAGE BOARDS Copyright Ying Zhang, 2014. Softcover

More information

The Information Retrieval Series. Series Editor W. Bruce Croft

The Information Retrieval Series. Series Editor W. Bruce Croft The Information Retrieval Series Series Editor W. Bruce Croft Sándor Dominich The Modern Algebra of Information Retrieval 123 Sándor Dominich Computer Science Department University of Pannonia Egyetem

More information

C++ Quick Syntax Reference

C++ Quick Syntax Reference C++ Quick Syntax Reference Mikael Olsson C++ Quick Syntax Reference Copyright 2013 by Mikael Olsson This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part

More information

Computers as Components Principles of Embedded Computing System Design

Computers as Components Principles of Embedded Computing System Design Computers as Components Principles of Embedded Computing System Design Third Edition Marilyn Wolf ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY

More information

Course Introduction & Foundational Concepts

Course Introduction & Foundational Concepts Course Introduction & Foundational Concepts CPS 352: Database Systems Simon Miner Gordon College Last Revised: 8/30/12 Agenda Introductions Course Syllabus Databases Why What Terminology and Concepts Design

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Xceedium Gatekeeper Version 3.6 Report Number: CCEVS-VR-06-0048 Dated: 31 October 2006 Version:

More information

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design Database Systems: Design, Implementation, and Management Tenth Edition Chapter 9 Database Design Objectives In this chapter, you will learn: That successful database design must reflect the information

More information

SYMBOLIC COMPUTATION. Managing Editors: J. Encama~o P. Hayes Artificial Intelligence Editors: L. Bole A Bundy J. Siekmann

SYMBOLIC COMPUTATION. Managing Editors: J. Encama~o P. Hayes Artificial Intelligence Editors: L. Bole A Bundy J. Siekmann SYMBOLIC COMPUTATION Managing Editors: J. Encama~o P. Hayes Artificial Intelligence Editors: L. Bole A Bundy J. Siekmann The Design of Interpreters, Compilers, and Editors for Augmented Transition Networks

More information

Lecture Notes in Computer Science

Lecture Notes in Computer Science L.. Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 60 M. J. Flynn, J. N. Gray, A. K. Jones, K. Lagally H. Opderbeck, G. J. Popek, B. Randell J. H. Saltzer, H. R. Wiehle Operating

More information

MULTILEVEL SECURITY FOR KNOWLEDGE BASED SYSTEMS

MULTILEVEL SECURITY FOR KNOWLEDGE BASED SYSTEMS AD-A234 974 RADC-TR-90-406 Final Technical Report December 1990 MULTILEVEL SECURITY FOR KNOWLEDGE BASED SYSTEMS SRI international Teresa F. Lunt and Thomas D. Garvey APPROVED FOR PUBLIC RELEASe" DISTRIBUTION

More information

Convex Analysis and Minimization Algorithms I

Convex Analysis and Minimization Algorithms I Jean-Baptiste Hiriart-Urruty Claude Lemarechal Convex Analysis and Minimization Algorithms I Fundamentals With 113 Figures Springer-Verlag Berlin Heidelberg New York London Paris Tokyo Hong Kong Barcelona

More information

Cambridge University Press The Elements of UML 2.0 Style Scott W. Ambler Frontmatter More information. The Elements. UML TM2.

Cambridge University Press The Elements of UML 2.0 Style Scott W. Ambler Frontmatter More information. The Elements. UML TM2. The Elements of UML TM2.0 Style For Beverley The Elements of UML TM2.0 Style CAMBRIDGE UNIVERSITY PRESS Cambridge,NewYork,Melbourne,Madrid,CapeTown,Singapore,SãoPaulo Cambridge University Press 40 West

More information

"Charting the Course... MOC C: Developing SQL Databases. Course Summary

Charting the Course... MOC C: Developing SQL Databases. Course Summary Course Summary Description This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL database. The course focuses on teaching individuals how to use

More information

Functional Programming in R

Functional Programming in R Functional Programming in R Advanced Statistical Programming for Data Science, Analysis and Finance Thomas Mailund Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis

More information

Part I: Data Mining Foundations

Part I: Data Mining Foundations Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?

More information

Objective-C Quick Syntax Reference

Objective-C Quick Syntax Reference Objective-C Quick Syntax Reference Matthew Campbell Objective-C Quick Syntax Reference Copyright 2014 by Matthew Campbell This work is subject to copyright. All rights are reserved by the Publisher, whether

More information

Essential Angular for ASP.NET Core MVC

Essential Angular for ASP.NET Core MVC Essential Angular for ASP.NET Core MVC Adam Freeman Essential Angular for ASP.NET Core MVC Adam Freeman London, UK ISBN-13 (pbk): 978-1-4842-2915-6 ISBN-13 (electronic): 978-1-4842-2916-3 DOI 10.1007/978-1-4842-2916-3

More information

Database Security Overview. Murat Kantarcioglu

Database Security Overview. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Database Security Overview Murat Kantarcioglu Topics The access control model of System R Extensions to the System R model Views and content-based

More information

XML for Bioinformatics

XML for Bioinformatics XML for Bioinformatics Ethan Cerami XML for Bioinformatics Library of Congress Cataloging-in-Publication Data Cerami, Ethan. XML for bioinformatics / Ethan Cerami. p. cm. Includes bibliographical references

More information

[19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No.

[19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No. [19] P. P. Chen. The Entity-Relationship Model - Towards a unified view of data. ACM Trans. Database Systems (ToDS), Vol. 1, No. 1 (March 1976), 9-36. [20] J. Biskup, H. H. Brüggemann. Das datenschutzorientierte

More information

ABSTRACT 1. INTRODUCTION

ABSTRACT 1. INTRODUCTION SECURITY CONSTRAINT PROCESSING DURING THE UPDATE OPERATION IN A MULTILEVEL SECURE DATABASE MANAGEMENT SYSTEM Marie Collins, William Ford, and Bhavani Thuraisingham The MITRE Corporation, Burlington Road,

More information

Encyclopedia of Information Science and Technology

Encyclopedia of Information Science and Technology Encyclopedia of Information Science and Technology Second Edition Mehdi Khosrow-Pour Information Resources Management Association, USA Volume IV G-Internet INFORMATION SCIENCE REFERENCE Hershey New York

More information

C++ Programming for Programmers

C++ Programming for Programmers C++ Programming for Programmers Compiled and Presented by Thomas P. Sturm, Ph.D. Graduate Programs in Software Technical Seminar The University of St. Thomas St. Paul, Minnesota Copyright 1992, 1993, 1994,

More information

Information Modeling and Relational Databases

Information Modeling and Relational Databases Information Modeling and Relational Databases Second Edition Terry Halpin Neumont University Tony Morgan Neumont University AMSTERDAM» BOSTON. HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO

More information

Low Level X Window Programming

Low Level X Window Programming Low Level X Window Programming Ross J. Maloney Low Level X Window Programming An Introduction by Examples 123 Dr. Ross J. Maloney Yenolam Corporation Booragoon, WA Australia ISBN 978-3-319-74249-6 ISBN

More information

Specific Objectives Contents Teaching Hours 4 the basic concepts 1.1 Concepts of Relational Databases

Specific Objectives Contents Teaching Hours 4 the basic concepts 1.1 Concepts of Relational Databases Course Title: Advanced Database Management System Course No. : ICT. Ed 525 Nature of course: Theoretical + Practical Level: M.Ed. Credit Hour: 3(2T+1P) Semester: Second Teaching Hour: 80(32+8) 1. Course

More information

The Semantic Web Explained

The Semantic Web Explained The Semantic Web Explained The Semantic Web is a new area of research and development in the field of computer science, aimed at making it easier for computers to process the huge amount of information

More information

Failure-Modes-Based Software Reading

Failure-Modes-Based Software Reading SPRINGER BRIEFS IN COMPUTER SCIENCE Yang-Ming Zhu Failure-Modes-Based Software Reading SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Yang-Ming

More information

C Quick Syntax Reference

C Quick Syntax Reference C Quick Syntax Reference Mikael Olsson C Quick Syntax Reference Copyright 2015 by Mikael Olsson This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of

More information

Stefan Waldmann. Topology. An Introduction

Stefan Waldmann. Topology. An Introduction Topology Stefan Waldmann Topology An Introduction 123 Stefan Waldmann Julius Maximilian University of Würzburg Würzburg Germany ISBN 978-3-319-09679-7 ISBN 978-3-319-09680-3 (ebook) DOI 10.1007/978-3-319-09680-3

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Extended Package for Secure Shell, Version 1.0, February 19, 2016 Report Number: CCEVS-VR-PP-0039

More information

Practical Database Design Methodology and Use of UML Diagrams Design & Analysis of Database Systems

Practical Database Design Methodology and Use of UML Diagrams Design & Analysis of Database Systems Practical Database Design Methodology and Use of UML Diagrams 406.426 Design & Analysis of Database Systems Jonghun Park jonghun@snu.ac.kr Dept. of Industrial Engineering Seoul National University chapter

More information

Towards Formal Evaluation of a High-Assurance Guard

Towards Formal Evaluation of a High-Assurance Guard Towards Formal Evaluation of a High-Assurance Guard Mark R. Heckman Roger R. Schell Edwards E. Reed 2012 Layered Assurance Workshop,

More information

Java Quick Syntax Reference. Second Edition. Mikael Olsson

Java Quick Syntax Reference. Second Edition. Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Second Edition Mikael Olsson Java Quick Syntax Reference Mikael Olsson Hammarland, Länsi-Suomi, Finland ISBN-13 (pbk):

More information