close
1.

図書

図書
Hideko S. Kunii, Sushil Jajodia, Arne Sølvberg (eds.)
出版情報: Berlin : Springer, c2001  xix, 614 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2224
所蔵情報: loading…
2.

図書

図書
Sushil Jajodia, Duminda Wijesekera (eds.)
出版情報: Berlin : Springer, c2005  x, 352 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3654
所蔵情報: loading…
3.

図書

図書
ICISS ; Jajodia, Sushil ; Mazumdar, Chandan
出版情報: Berlin : Springer, c2005  xi, 342 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3803
所蔵情報: loading…
4.

図書

図書
edited by Sushil Jajodia, Leon Strous
出版情報: Boston : Kluwer Academic, 2004  viii, 253 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 140
所蔵情報: loading…
5.

図書

図書
edited by Sushil Jajodia ... [et al.]
出版情報: London : Chapman & Hall, 1997  366 p. ; 24 cm
シリーズ名: Integrity and internal control in information systems : IFIP TC-11 WG11.5 First Working Conference on Integrity and Internal Control in Information Systems 4-5 December 1997, Zürich, Switzerland ; vol.1
所蔵情報: loading…
6.

図書

図書
Opher Etzion, Sushil Jajodia, Suryanarayana Sripada, eds
出版情報: Berlin ; Tokyo : Springer, c1998  x, 428 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1399
所蔵情報: loading…
7.

図書

図書
Sushil Jajodia, M. Tamer Özsu, Asuman Dogac (eds.)
出版情報: Berlin ; Tokyo : Springer, c1998  viii, 206 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1508
所蔵情報: loading…
8.

図書

図書
edited by Sushil Jajodia, Pierangela Samarati ; sponsored by ACM SIGSAC
出版情報: New York : Association for Computing Machinery, c2000  xii, 255 p. ; 28 cm
所蔵情報: loading…
9.

図書

図書
edited by Sushil Jajodia ... [et al.]
出版情報: Boston : Kluwer Academic, c1998  viii, 290 p. ; 25 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
IFIP TC-11 Working Group 11.5 / Part 1:
Propagating Integrity Information Among Interrelated Databases / A. Rosenthal ; E. Sciore1:
Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules / L.G. Gomez ; S.D. Urban2:
The Constraint Operator of MedLan: Its Efficient Implementation and Use / P. Asirelli, et al.3:
Growing Dependency on IT: The Consequences Thereof for the Organization and for IT-Auditors / M.E. van Biene-Hershey4:
TOP: An Example of Complex Application Controls / M. Korver5:
Algebra for Databases with Explicit Markings of Damaged Data / G. Rumolo ; S. Jajodia6:
Application of Models from Epidemiology to Metrics for Computer Virus Risk / J.L. Aron ; R.A. Gove7:
Integrity Control of Spreadsheets: Organisation & Tools / K. Rajalingham ; D. Chadwick8:
Design Basis for Achieving Information Integrity - a Feedback Control System Approach / V.V. Mandke ; K.M. Nayar9:
Modification of Integrity Constraints Through Knowledge Discovery / V. Atluri10:
Managing Data Quality and Integrity in Federated Databases / M. Gertz11:
A Logical Formalization of Integrity Policies for Database Management Systems / F. Cuppens ; C. Saurel12:
Maintaining Integrity Constraints and Security in Real-Time Database Systems / Q.N. Ahmed ; S.V. Vrbsky13:
Assurance - What is it? / M.D. Abrams, et al.14:
General Information / Part 2:
IFIP TC-11
IFIP TC-11 Working Groups
Index of Contributors
Keyword
Index
Preface
IFIP TC-11 Working Group 11.5 / Part 1:
Propagating Integrity Information Among Interrelated Databases / A. Rosenthal ; E. Sciore1:
10.

図書

図書
edited by Sushil Jajodia
出版情報: Boston : Kluwer Academic Publishers, 1999  xx, 296 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 14
所蔵情報: loading…
目次情報: 続きを見る
List of Figures
List of Tables
Preface
Contributing Authors
Invited Talks / Part I:
E-Commerce Security: No Silver Bullet / A.K. Ghosh1:
Technical Enforcement of Informational Assurances / J. Biskup2:
Workflow / Part II:
Analyzing the Safety of Workflow Authorization Models / W.-K. Huang ; V. Atluri3:
Rules and Patterns for Security in Workflow Systems / S. Castano ; M.G. Fugini4:
Privacy / Part III:
An information-flow model for Privacy (InfoPriv) / L.C.J. Dreyer ; M.S. Olivier5:
Policy Modeling / Part IV:
Security Policies in Replicated and Autonomous Databases / E. Gudes6:
Programmable Security for Object-Oriented Systems / J. Hale, et al.7:
Mediation / Part V:
Secure Mediation: Requirements and Design / J. Biskup, et al.8:
Information Warfare Defense / Part VI:
Reconstructing the Database after Electronic Attacks / B. Panda ; J. Giordano9:
Multilevel Security / Part VII:
Version Management in the STAR MLS Database System / R. Sripada ; T.F. Keefe10:
SACADDOS: a support tool to manage multilevel documents / J. Carrere, et al.11:
Role-based Access Controls / Part VIII:
Using Role-Templates for Handling Recurring Role Structures / W. Essmayr, et al.12:
Role Based Security and Java / D. Smarkusky, et al.13:
Mobile Databases / Part IX:
Security Issues in Mobile Database Access / A. Lubinski14:
Inference / Part X:
Bayesian Methods Applied to the Database Inference Problem / L.W. Chang ; I.S. Moskowitz15:
The Design and Implementation of a Data Level Database Inference Detection System / R.W. Yip ; K.N. Levitt16:
Panel / Part XI:
Security and Privacy Issues for the World Wide Web: Panel Discussion / B. Thuraisingham, et al.17:
Discussion Summary / Part XII:
Workshop Summary / W. Atluri ; D.L. Spooner18:
Index
List of Figures
List of Tables
Preface
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼