Multilevel Security for Relational Databases

Book description

Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Most database security models focus on protecting against external unauthorized users. Because multilevel secure databases provide internal security according to user access type, they are a viable option for the security needs of modern database systems. Covering key concepts in database security, this book illustrates the implementation of multilevel security for relational database models. It considers concurrency control in multilevel database security and presents encryption algorithms. It also includes simulation programs and Visual studio and Microsoft SQL Server code for the simulations covered in the text.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Preface
  6. About the Authors
  7. Chapter 1: Concepts of Database Security (1/4)
  8. Chapter 1: Concepts of Database Security (2/4)
  9. Chapter 1: Concepts of Database Security (3/4)
  10. Chapter 1: Concepts of Database Security (4/4)
  11. Chapter 2: Basic Concept of Multilevel Database Security (1/4)
  12. Chapter 2: Basic Concept of Multilevel Database Security (2/4)
  13. Chapter 2: Basic Concept of Multilevel Database Security (3/4)
  14. Chapter 2: Basic Concept of Multilevel Database Security (4/4)
  15. Chapter 3: Implementation of MLS/DBMS Models (1/6)
  16. Chapter 3: Implementation of MLS/DBMS Models (2/6)
  17. Chapter 3: Implementation of MLS/DBMS Models (3/6)
  18. Chapter 3: Implementation of MLS/DBMS Models (4/6)
  19. Chapter 3: Implementation of MLS/DBMS Models (5/6)
  20. Chapter 3: Implementation of MLS/DBMS Models (6/6)
  21. Chapter 4: Fundamentals of Information Encryption (1/5)
  22. Chapter 4: Fundamentals of Information Encryption (2/5)
  23. Chapter 4: Fundamentals of Information Encryption (3/5)
  24. Chapter 4: Fundamentals of Information Encryption (4/5)
  25. Chapter 4: Fundamentals of Information Encryption (5/5)
  26. Chapter 5: Encryption-Based Multilevel Model for DBMS (1/5)
  27. Chapter 5: Encryption-Based Multilevel Model for DBMS (2/5)
  28. Chapter 5: Encryption-Based Multilevel Model for DBMS (3/5)
  29. Chapter 5: Encryption-Based Multilevel Model for DBMS (4/5)
  30. Chapter 5: Encryption-Based Multilevel Model for DBMS (5/5)
  31. Chapter 6: Formal Analysis for Encryption-Based Multilevel Model for DBMS (1/4)
  32. Chapter 6: Formal Analysis for Encryption-Based Multilevel Model for DBMS (2/4)
  33. Chapter 6: Formal Analysis for Encryption-Based Multilevel Model for DBMS (3/4)
  34. Chapter 6: Formal Analysis for Encryption-Based Multilevel Model for DBMS (4/4)
  35. Chapter 7: Concurrency Control in Multilevel Relational Databases (1/3)
  36. Chapter 7: Concurrency Control in Multilevel Relational Databases (2/3)
  37. Chapter 7: Concurrency Control in Multilevel Relational Databases (3/3)
  38. Chapter 8: The Instance-Based Multilevel Security Model (1/3)
  39. Chapter 8: The Instance-Based Multilevel Security Model (2/3)
  40. Chapter 8: The Instance-Based Multilevel Security Model (3/3)
  41. Chapter 9: The Source Code (1/22)
  42. Chapter 9: The Source Code (2/22)
  43. Chapter 9: The Source Code (3/22)
  44. Chapter 9: The Source Code (4/22)
  45. Chapter 9: The Source Code (5/22)
  46. Chapter 9: The Source Code (6/22)
  47. Chapter 9: The Source Code (7/22)
  48. Chapter 9: The Source Code (8/22)
  49. Chapter 9: The Source Code (9/22)
  50. Chapter 9: The Source Code (10/22)
  51. Chapter 9: The Source Code (11/22)
  52. Chapter 9: The Source Code (12/22)
  53. Chapter 9: The Source Code (13/22)
  54. Chapter 9: The Source Code (14/22)
  55. Chapter 9: The Source Code (15/22)
  56. Chapter 9: The Source Code (16/22)
  57. Chapter 9: The Source Code (17/22)
  58. Chapter 9: The Source Code (18/22)
  59. Chapter 9: The Source Code (19/22)
  60. Chapter 9: The Source Code (20/22)
  61. Chapter 9: The Source Code (21/22)
  62. Chapter 9: The Source Code (22/22)
  63. References (1/2)
  64. References (2/2)
  65. Back Cover

Product information

  • Title: Multilevel Security for Relational Databases
  • Author(s): Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi Abd El-Samie, Ahmed I. Sallam, Hala S. El-Sayed
  • Release date: December 2014
  • Publisher(s): Auerbach Publications
  • ISBN: 9781482205404