Skip to main content
  • Book
  • © 2008

Handbook of Database Security

Applications and Trends

  • Most comprehensive work on data security aspects published in the last 10 years
  • Includes SQL standards and security in commercial and open-source database management systems
  • Outlines future research direction in the field

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 chapters)

  1. Front Matter

    Pages I-XIV
  2. Recent Advances in Access Control

    • S. De Capitani di Vimercati, S. Foresti, P. Samarati
    Pages 1-26
  3. Access Control Models for XML

    • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati
    Pages 27-53
  4. Access Control Policy Languages in XML

    • Naizhen Qi, Michiharu Kudo
    Pages 55-71
  5. Database Issues in Trust Management and Trust Negotiation

    • Dongyi Li, William Winsborough, Marianne Winslett, Ragib Hasan
    Pages 73-113
  6. Authenticated Index Structures for Outsourced Databases

    • Feifei Li, Marios Hadjileftheriou, George Kollios, Leonid Reyzin
    Pages 115-136
  7. Towards Secure Data Outsourcing

    • Radu Sion
    Pages 137-161
  8. Managing and Querying Encrypted Data

    • Bijit Hore, Sharad Mehrotra, Hakan Hacigümüç
    Pages 163-190
  9. Security in Data Warehouses and OLAP Systems

    • Lingyu Wang, Sushil Jajodia
    Pages 191-212
  10. Security for Workflow Systems

    • Vijayalakshmi Atluri, Janice Warner
    Pages 213-230
  11. Secure Semantic Web Services

    • Bhavani Thuraisingham
    Pages 231-245
  12. Geospatial Database Security

    • Soon Ae Chun, Vijayalakshmi Atluri
    Pages 247-266
  13. Security Re-engineering for Databases: Concepts and Techniques

    • Michael Gertz, Madhavi Gandhi
    Pages 267-296
  14. Database Watermarking: A Systematic View

    • Yingjiu Li
    Pages 329-355
  15. Trustworthy Records Retention

    • Ragib Hasan, Marianne Winslett, Soumyadeb Mitra, Windsor Hsu, Radu Sion
    Pages 357-381
  16. Damage Quarantine and Recovery in Data Processing Systems

    • Peng Liu, Sushil Jajodia, Meng Yu
    Pages 383-407
  17. Hippocratic Databases: Current Capabilities and Future Trends

    • Tyrone Grandison, Christopher Johnson, Jerry Kiernan
    Pages 409-429
  18. Privacy-Preserving Data Mining: A Survey

    • Charu C. Aggarwal, Philip S. Yu
    Pages 431-460

About this book

Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today’s often missi- critical databases no longer contain only data used for day-to-day processing by organization; as new applications are being added, it is possible for organizations to collect and store vast amounts of data quickly and ef ciently and to make the data readily accessible to the public, typically through Web-based applications. Unfor- nately, if security threats related to the integrity, availability, and privacy of the data are not properly resolved, databases remain vulnerable to malicious attacks and - cidental misuse. Such incidents, in turn, may translate into nancial losses or losses whose values are obviously high but dif cult to quantify, e. g. , the loss of the public’s trust in the data management infrastructure and services offered by an organization. In assembling this handbook, we have had a twofold objective: rst, to provide a comprehensive summary of the results of research and development activities in various aspects of database security up to this point, and second, to point toward directions for future work in this important and fruitful eld of research.

Editors and Affiliations

  • Dept. of Computer Science, University of California at Davis, Davis

    Michael Gertz

  • George Mason University Center for Secure Information Systems Research I, Fairfax

    Sushil Jajodia

Bibliographic Information

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access