메뉴 건너뛰기




Volumn 22, Issue 1, 1996, Pages 43-52

Computational issues in secure interoperation

Author keywords

Computer security, database systems, interoperability, secure composability, algorithms, computational complexity

Indexed keywords


EID: 0010032891     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/32.481533     Document Type: Article
Times cited : (129)

References (18)
  • 1
    • 0025489261 scopus 로고    scopus 로고
    • "Federated database systems for managing distributed, heterogeneous, and autonomous databases,"
    • vol. 22, no. 3, pp. 183-236, Sept. 1990.
    • A. Sheth and J. Larson, "Federated database systems for managing distributed, heterogeneous, and autonomous databases," ACM Computing Surveys, vol. 22, no. 3, pp. 183-236, Sept. 1990.
    • ACM Computing Surveys
    • Sheth, A.1    Larson, J.2
  • 2
    • 0003969639 scopus 로고    scopus 로고
    • NCSC-TG-005, version-1, July 1987.
    • U.S. National Computer Security Center, Trusted Network Interpretation, NCSC-TG-005, version-1, July 1987.
    • Trusted Network Interpretation
  • 6
    • 0016984825 scopus 로고    scopus 로고
    • "Protection in operating systems,"
    • vol. 19, no. 8, pp. 461-471, Aug. 1976.
    • M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, "Protection in operating systems," Comm. ACM, vol. 19, no. 8, pp. 461-471, Aug. 1976.
    • Comm. ACM
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 9
    • 0019608720 scopus 로고    scopus 로고
    • "Formal models for computer security,"
    • vol. 13, no. 3, pp. 247-278, Sept. 1981.
    • C.E. Landwehr, "Formal models for computer security," ACM Computing Survey, vol. 13, no. 3, pp. 247-278, Sept. 1981.
    • ACM Computing Survey
    • Landwehr, C.E.1
  • 11
    • 0024714097 scopus 로고    scopus 로고
    • "Integrating security in a large distributed system,"
    • vol. 7, no. 3, pp. 247-280, Aug. 1989.
    • [II] M. Satyanarayanan, "Integrating security in a large distributed system," ACM Trans. Computer System, vol. 7, no. 3, pp. 247-280, Aug. 1989.
    • ACM Trans. Computer System
    • Satyanarayanan, M.1
  • 13
    • 33747376695 scopus 로고    scopus 로고
    • "Canonical security modeling for federated databases,"
    • 2/WG2.6 Co. J. Semantics of Interoperable Database Systems, Nov. 1992.
    • G. Pernul, "Canonical security modeling for federated databases," Proc. If IP TC2/WG2.6 Co. J. Semantics of Interoperable Database Systems, Nov. 1992.
    • Proc. if IP TC
    • Pernul, G.1
  • 14
    • 0025438880 scopus 로고    scopus 로고
    • "A hookup theorem for multilevel security,"
    • vol. 16, no. 6, pp. 563-568, June 1990.
    • D. McCullough, "A hookup theorem for multilevel security," IEEE Trans. Software Engineering, vol. 16, no. 6, pp. 563-568, June 1990.
    • IEEE Trans. Software Engineering
    • McCullough, D.1
  • 16
    • 85028925878 scopus 로고    scopus 로고
    • "Proof verification and hardness of approximation problems,"
    • 33rd Annual Symp. Foundations of Computer Science, Pittsburgh, Perm., pp. 14-23, Oct. 1992.
    • S. Arora, G. Lund, R. Motwani, M. Sudan, and M. Szegedy, "Proof verification and hardness of approximation problems," Proc. IEEE 33rd Annual Symp. Foundations of Computer Science, Pittsburgh, Perm., pp. 14-23, Oct. 1992.
    • Proc. IEEE
    • Arora, S.1    Lund, G.2    Motwani, R.3    Sudan, M.4    Szegedy, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.