-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
Sept.
-
M. Abadi, M. Burrows, B.W. Lampson, and G. Plotkin, "A calculus for access control in distributed systems," ACM Trans. Programming Languages and Systems, vol. 15, no. 4, pp. 706-734, Sept. 1993.
-
(1993)
ACM Trans. Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.W.3
Plotkin, G.4
-
2
-
-
78449296490
-
On the representation of infinite temporal data and queries
-
Denver, May
-
M. Baudinet, M. Niézette, and P. Wolper, "On the representation of infinite temporal data and queries (extended abstract)," Proc. ACM Symp. Principles of Database Systems, pp. 280-290, Denver, May 1991.
-
(1991)
Proc. ACM Symp. Principles of Database Systems
, pp. 280-290
-
-
Baudinet, M.1
Niézette, M.2
Wolper, P.3
-
3
-
-
33747472741
-
-
Technical Report 137-95, DSI-Univ. of Milano
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, "A temporal access control model for database systems," Technical Report 137-95, DSI-Univ. of Milano, 1995.
-
(1995)
A Temporal Access Control Model for Database Systems
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
4
-
-
78449251691
-
A temporal authorization model
-
Fairfax,Va., Nov.
-
E. Bertino, C. Bettini, and P. Samarati, "A temporal authorization model," Proc. Second ACM Conf. Computer and Communications Security, pp. 126-135, Fairfax,Va., Nov. 1994.
-
(1994)
Proc. Second ACM Conf. Computer and Communications Security
, pp. 126-135
-
-
Bertino, E.1
Bettini, C.2
Samarati, P.3
-
5
-
-
0027741527
-
Authorizations in relational database management systems
-
Fairfax, Va., Nov.
-
E. Bertino, P. Samarati, and S. Jajodia, "Authorizations in relational database management systems," Proc. First ACM Conf. Computer and Comm. Security, Fairfax, Va., Nov. 1993.
-
(1993)
Proc. First ACM Conf. Computer and Comm. Security
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
6
-
-
0003134527
-
Deriving production rules for incremental view maintenance
-
Barcelona
-
S. Ceri and J. Widom, "Deriving production rules for incremental view maintenance," Proc. 17th VLDB, pp. 735-749, Barcelona, 1991.
-
(1991)
Proc. 17th VLDB
, pp. 735-749
-
-
Ceri, S.1
Widom, J.2
-
7
-
-
0001119421
-
The stable model semantics for logic programming
-
R. Kowalski and K. Bowen, eds., Cambridge, Mass.: MIT Press
-
M. Gelfond and V. Lifschitz, "The stable model semantics for logic programming," Proc. Fifth Int'l Conf. Logic Programming, R. Kowalski and K. Bowen, eds., pp. 1,070-1,080, Cambridge, Mass.: MIT Press, 1988.
-
(1988)
Proc. Fifth Int'l Conf. Logic Programming
-
-
Gelfond, M.1
Lifschitz, V.2
-
8
-
-
0027621766
-
Maintaining views incrementally
-
Portland, Ore., May
-
I.S. Gupta, A. Mumick, and V.S. Subrahmanian, "Maintaining views incrementally," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 157-166, Portland, Ore., May 1993.
-
(1993)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 157-166
-
-
Gupta, I.S.1
Mumick, A.2
Subrahmanian, V.S.3
-
9
-
-
0005864589
-
Single-level multiversion schedulers for multilevel secure database systems
-
Tucson, Ariz., Dec.
-
W.T. Maimone and I.B. Greenberg, "Single-level multiversion schedulers for multilevel secure database systems," Proc. Sixth Ann. Computer Security Applications Conf., pp. 137-147, Tucson, Ariz., Dec. 1990.
-
(1990)
Proc. Sixth Ann. Computer Security Applications Conf.
, pp. 137-147
-
-
Maimone, W.T.1
Greenberg, I.B.2
-
10
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, Winter
-
J.G. Steiner, C. Neuman, and J.I. Schiller, "Kerberos: An authentication service for open network systems," USENIX Conf. Proc., pp. 191-202, Dallas, Winter 1988.
-
(1988)
USENIX Conf. Proc.
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, C.2
Schiller, J.I.3
-
11
-
-
0346299851
-
Discretionary access control in object-oriented databases: Issues and research directions
-
Baltimore, Sept.
-
R.K. Thomas and R.S. Sandhu, "Discretionary access control in object-oriented databases: Issues and research directions," Proc. 16th Nat'l Computer Security Conf., pp. 63-74, Baltimore, Sept. 1993.
-
(1993)
Proc. 16th Nat'l Computer Security Conf.
, pp. 63-74
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
12
-
-
71149116148
-
The well-founded semantics for general logic programs
-
July
-
A. van Gelder, K. Ross, and J.S. Schlipf, "The well-founded semantics for general logic programs," J. ACM, vol. 38, no. 3, pp. 620-650 July 1991.
-
(1991)
J. ACM
, vol.38
, Issue.3
, pp. 620-650
-
-
Van Gelder, A.1
Ross, K.2
Schlipf, J.S.3
-
13
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
T.Y.C. Woo and S.S. Lam, "Authorizations in distributed systems: A new approach," J. Computer Security, vol. 2, nos. 2-3, pp. 107-136, 1993.
-
(1993)
J. Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
|