资源描述:
《reallyusefulebooks0387485325springer.handbook.of.database.security.nov.2007.ebookbbl外语英文电子书》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、HandbookofDatabaseSecurityApplicationsandTrendsHandbookofDatabaseSecurityApplicationsandTrendseditedbyMichaelGertzUniversityofCaliforniaatDavisUSASushilJajodiaGeorgeMasonUniversityUSAMichaelGertzSushilJajodiaUniversityofCaliforniaatDavisGeorgeMasonUniversityDept.ofComputerScienceCenterforSecureIn
2、formationSystemsOneShieldsAvenueResearchI,Suite417Davis,CA95616-8562FairfaxVA22030-4444gertz@cs.ucdavis.edujajodia@gmu.eduLibraryofCongressControlNumber:2007934795ISBN-13:978-0-387-48532-4e-ISBN-13:978-0-387-48533-1Printedonacid-freepaper.c2008SpringerScience+BusinessMedia,LLC.Allrightsreserved.
3、Thisworkmaynotbetranslatedorcopiedinwholeorinpartwithoutthewrittenpermissionofthepublisher(SpringerScience+BusinessMedia,LLC,233SpringStreet,NewYork,NY10013,USA),exceptforbriefexcerptsinconnectionwithreviewsorscholarlyanalysis.Useinconnectionwithanyformofinformationstorageandretrieval,electronica
4、daptation,computersoftware,orbysimilarordissimilarmethodologynowknownorhereafterdevelopedisforbidden.Theuseinthispublicationoftradenames,trademarks,servicemarksandsimilarterms,eveniftheyarenotidentifiedassuch,isnottobetakenasanexpressionofopinionastowhetherornottheyaresubjecttoproprietaryrights.98
5、7654321springer.comPrefaceMotivationforthebookDatabasesecurityhasbeengainingagreatdealofimportanceasindustry,military,andgovernmentorganizationshaveincreasinglyadoptedInternet-basedtechnolo-giesonalarge-scale,becauseofconvenience,easeofuse,andtheabilitytotakeadvantageofrapidadvancesinthecommercia
6、lmarket.Alongwiththetraditionalsecurityaspectsofdataintegrityandavailability,thereisanincreasinginterestinresearchanddevelopmentindataprivacy.Thisisbecausetodaysoftenmission-criticaldatabasesnolongercontainonlydatausedforday-to-dayprocessingbyorganization;asnewapplicationsarebeingadded,itispossib
7、lefororganizationstocollectandstorevastamountsofdataquicklyandefficientlyandtomakethedatareadilyaccessibletothepublic,typicallythroughWeb-basedapplications.Unfortu-nately,ifsecuritythreatsrelatedtotheintegrity,availabil