000 -LEADER |
fixed length control field |
03427cam a22003858a 4500 |
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140624s2014 flu b 001 0 eng |
LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2014020608 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781482205398 |
CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
DLC |
AUTHENTICATION CODE |
Authentication code |
pcc |
LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.D314 |
Item number |
F37 2014 |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
OTHER CLASSIFICATION NUMBER |
Classification number |
COM021000 |
-- |
COM051230 |
-- |
COM053000 |
Source of number |
bisacsh |
SYSTEM CONTROL NUMBER |
System control number |
(IMchF)fol15285432 |
DATE AND TIME OF LATEST TRANSACTION |
control field |
20170126100620.0 |
CONTROL NUMBER |
control field |
59182 |
CONTROL NUMBER IDENTIFIER |
control field |
UOWD |
MAIN ENTRY--PERSONAL NAME |
Personal name |
Faragallah, Osama S. |
TITLE STATEMENT |
Title |
Multilevel security for relational databases |
Statement of responsibility, etc |
Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, and Hala S. El-Sayed |
PROJECTED PUBLICATION DATE |
Projected publication date |
1412 |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boca Raton : |
Name of publisher, distributor, etc |
Taylor & Francis, CRC Press, |
Date of publication, distribution, etc |
2014. |
PHYSICAL DESCRIPTION |
Extent |
xv, 288 p. ; |
Dimensions |
24 cm. |
SUMMARY, ETC. |
Summary, etc |
"Most database security models focus on protecting against external unauthorized users. Because multilevel secure databases provide internal security according to user access type, they are a viable option for the security needs of modern database systems. Covering key concepts in database security, this book illustrates the implementation of multilevel security for relational database models. It considers concurrency control in multilevel database security and presents encryption algorithms. It also includes simulation programs and Visual studio and Microsoft SQL Server code for the simulations covered in the text"-- |
BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
SUMMARY, ETC. |
Summary, etc |
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database--illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Database security |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS / Database Management / General |
Source of heading or term |
bisacsh |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS / Software Development & Engineering / General |
Source of heading or term |
bisacsh |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS / Security / General |
Source of heading or term |
bisacsh |
ADDED ENTRY--PERSONAL NAME |
Personal name |
El-Rabaie, El-Sayed M. |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Abd El-Samie, Fathi E. |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Sallam, Ahmed I. |
ADDED ENTRY--PERSONAL NAME |
Personal name |
El-Sayed, Hala S. |
ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
REGULAR |