-
1
-
-
0025489261
-
"Federated database systems for managing distributed, heterogeneous, and autonomous databases,"
-
vol. 22, no. 3, pp. 183-236, Sept. 1990.
-
A. Sheth and J. Larson, "Federated database systems for managing distributed, heterogeneous, and autonomous databases," ACM Computing Surveys, vol. 22, no. 3, pp. 183-236, Sept. 1990.
-
ACM Computing Surveys
-
-
Sheth, A.1
Larson, J.2
-
2
-
-
0003969639
-
-
NCSC-TG-005, version-1, July 1987.
-
U.S. National Computer Security Center, Trusted Network Interpretation, NCSC-TG-005, version-1, July 1987.
-
Trusted Network Interpretation
-
-
-
4
-
-
85029502150
-
"Towards security in an open systems federation,"
-
vol. 648, Lecture Notes in Computer Science, pp. 3-20, Springer-Verlag, Nov. 1992.
-
J.A. Bull, L. Gong, and K.R. Sollins, "Towards security in an open systems federation," Proc. European Symp. Research in Computer Security, Toulouse, France, vol. 648, Lecture Notes in Computer Science, pp. 3-20, Springer-Verlag, Nov. 1992.
-
Proc. European Symp. Research in Computer Security, Toulouse, France
-
-
Bull, J.A.1
Gong, L.2
Sollins, K.R.3
-
5
-
-
33747358127
-
"Protection," Proc
-
1971. Reprinted in ACM Operating Systems Review, vol. 8, no.l, pp. 18-24, Jan. 1974.
-
B.W. Lampson, "Protection," Proc. fifth Princeton Symp. Information Sciences and Systems, Princeton Univ., Mar. 1971. Reprinted in ACM Operating Systems Review, vol. 8, no.l, pp. 18-24, Jan. 1974.
-
Fifth Princeton Symp. Information Sciences and Systems, Princeton Univ., Mar.
-
-
Lampson, B.W.1
-
6
-
-
0016984825
-
"Protection in operating systems,"
-
vol. 19, no. 8, pp. 461-471, Aug. 1976.
-
M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, "Protection in operating systems," Comm. ACM, vol. 19, no. 8, pp. 461-471, Aug. 1976.
-
Comm. ACM
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
7
-
-
0026851842
-
"The typed access matrix model,"
-
122-136, May 1992.
-
R.S. Sandhu, "The typed access matrix model," Proc. IEEE Symp. Research in Security and Privacy, Oakland, Calif., pp. 122-136, May 1992.
-
Proc. IEEE Symp. Research in Security and Privacy, Oakland, Calif., Pp.
-
-
Sandhu, R.S.1
-
8
-
-
33747356578
-
-
D.E. Bell and L.J. La Padula, "Secure computer system: Unified exposition and multics interpretation," Tech. Report ESD-TR-75- 306, Bedford, Mass: The MITRE Corporation, Mar. 1976.
-
"Secure computer system: Unified exposition and multics interpretation," Tech. Report ESD-TR-75- 306, Bedford, Mass: the MITRE Corporation, Mar. 1976
-
-
Bell, D.E.1
La Padula, L.J.2
-
9
-
-
0019608720
-
"Formal models for computer security,"
-
vol. 13, no. 3, pp. 247-278, Sept. 1981.
-
C.E. Landwehr, "Formal models for computer security," ACM Computing Survey, vol. 13, no. 3, pp. 247-278, Sept. 1981.
-
ACM Computing Survey
-
-
Landwehr, C.E.1
-
10
-
-
84937428379
-
"Security polices and security models,"
-
11-20, Apr. 1982.
-
J.A. Goguen and J. Meseguer, "Security polices and security models," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 11-20, Apr. 1982.
-
Proc. IEEE Symp. Security and Privacy, Oakland, Calif., Pp.
-
-
Goguen, J.A.1
Meseguer, J.2
-
11
-
-
0024714097
-
"Integrating security in a large distributed system,"
-
vol. 7, no. 3, pp. 247-280, Aug. 1989.
-
[II] M. Satyanarayanan, "Integrating security in a large distributed system," ACM Trans. Computer System, vol. 7, no. 3, pp. 247-280, Aug. 1989.
-
ACM Trans. Computer System
-
-
Satyanarayanan, M.1
-
12
-
-
33747354963
-
-
192, p. 198, 1979, Paperback edition 1991.
-
M.R. Garey and D.S. Johnson, Computers and Intractability, New York: W.H. Freeman and Co., p. 192, p. 198, 1979, Paperback edition 1991.
-
Computers and Intractability, New York: W.H. Freeman and Co., P.
-
-
Garey, M.R.1
Johnson, D.S.2
-
13
-
-
33747376695
-
"Canonical security modeling for federated databases,"
-
2/WG2.6 Co. J. Semantics of Interoperable Database Systems, Nov. 1992.
-
G. Pernul, "Canonical security modeling for federated databases," Proc. If IP TC2/WG2.6 Co. J. Semantics of Interoperable Database Systems, Nov. 1992.
-
Proc. if IP TC
-
-
Pernul, G.1
-
14
-
-
0025438880
-
"A hookup theorem for multilevel security,"
-
vol. 16, no. 6, pp. 563-568, June 1990.
-
D. McCullough, "A hookup theorem for multilevel security," IEEE Trans. Software Engineering, vol. 16, no. 6, pp. 563-568, June 1990.
-
IEEE Trans. Software Engineering
-
-
McCullough, D.1
-
15
-
-
33747365924
-
"Secure database interoperation via role translation,"
-
1994. A previous version appeared as Technical Report, Dept. of Computer Science, Univ. of Illinois at Urbana-Champaign, Apr. 1993.
-
V.E. Jones and M. Winslett, "Secure database interoperation via role translation," Security for Object-Oriented Systems, B. Thuraisingham, R. Sandhu, and T.C. Ting, eds., London: Springer-Verlag, 1994. A previous version appeared as Technical Report, Dept. of Computer Science, Univ. of Illinois at Urbana-Champaign, Apr. 1993.
-
Security for Object-Oriented Systems, B. Thuraisingham, R. Sandhu, and T.C. Ting, Eds., London: Springer-Verlag
-
-
Jones, V.E.1
Winslett, M.2
-
16
-
-
85028925878
-
"Proof verification and hardness of approximation problems,"
-
33rd Annual Symp. Foundations of Computer Science, Pittsburgh, Perm., pp. 14-23, Oct. 1992.
-
S. Arora, G. Lund, R. Motwani, M. Sudan, and M. Szegedy, "Proof verification and hardness of approximation problems," Proc. IEEE 33rd Annual Symp. Foundations of Computer Science, Pittsburgh, Perm., pp. 14-23, Oct. 1992.
-
Proc. IEEE
-
-
Arora, S.1
Lund, G.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
17
-
-
0024663219
-
"The Chinese wall security policy,"
-
206-214, Apr. 1989.
-
D.F.C. Brewer and M.J. Nash, "The Chinese wall security policy," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 206-214, Apr. 1989.
-
Proc. IEEE Symp. Security and Privacy, Oakland, Calif., Pp.
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
18
-
-
0027969913
-
"The complexity and composability of secure interoperation,"
-
190-200, May 1994.
-
L. Gong and X. Qian, "The complexity and composability of secure interoperation," Proc. IEEE Symp. Research in Security and Privacy, Oakland, Calif., pp. 190-200, May 1994.
-
Proc. IEEE Symp. Research in Security and Privacy, Oakland, Calif., Pp.
-
-
Gong, L.1
Qian, X.2
|