메뉴 건너뛰기




Volumn 8, Issue 1, 1996, Pages 67-80

A temporal access control mechanism for database systems

Author keywords

Access control; Database management; Database security; General logic programs; Temporal authorization; Temporal reasoning

Indexed keywords

ALGORITHMS; COMPUTATIONAL LINGUISTICS; DATA ACQUISITION; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 0030087035     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/69.485637     Document Type: Article
Times cited : (84)

References (13)
  • 6
    • 0003134527 scopus 로고
    • Deriving production rules for incremental view maintenance
    • Barcelona
    • S. Ceri and J. Widom, "Deriving production rules for incremental view maintenance," Proc. 17th VLDB, pp. 735-749, Barcelona, 1991.
    • (1991) Proc. 17th VLDB , pp. 735-749
    • Ceri, S.1    Widom, J.2
  • 7
    • 0001119421 scopus 로고
    • The stable model semantics for logic programming
    • R. Kowalski and K. Bowen, eds., Cambridge, Mass.: MIT Press
    • M. Gelfond and V. Lifschitz, "The stable model semantics for logic programming," Proc. Fifth Int'l Conf. Logic Programming, R. Kowalski and K. Bowen, eds., pp. 1,070-1,080, Cambridge, Mass.: MIT Press, 1988.
    • (1988) Proc. Fifth Int'l Conf. Logic Programming
    • Gelfond, M.1    Lifschitz, V.2
  • 9
    • 0005864589 scopus 로고
    • Single-level multiversion schedulers for multilevel secure database systems
    • Tucson, Ariz., Dec.
    • W.T. Maimone and I.B. Greenberg, "Single-level multiversion schedulers for multilevel secure database systems," Proc. Sixth Ann. Computer Security Applications Conf., pp. 137-147, Tucson, Ariz., Dec. 1990.
    • (1990) Proc. Sixth Ann. Computer Security Applications Conf. , pp. 137-147
    • Maimone, W.T.1    Greenberg, I.B.2
  • 10
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Dallas, Winter
    • J.G. Steiner, C. Neuman, and J.I. Schiller, "Kerberos: An authentication service for open network systems," USENIX Conf. Proc., pp. 191-202, Dallas, Winter 1988.
    • (1988) USENIX Conf. Proc. , pp. 191-202
    • Steiner, J.G.1    Neuman, C.2    Schiller, J.I.3
  • 11
    • 0346299851 scopus 로고
    • Discretionary access control in object-oriented databases: Issues and research directions
    • Baltimore, Sept.
    • R.K. Thomas and R.S. Sandhu, "Discretionary access control in object-oriented databases: Issues and research directions," Proc. 16th Nat'l Computer Security Conf., pp. 63-74, Baltimore, Sept. 1993.
    • (1993) Proc. 16th Nat'l Computer Security Conf. , pp. 63-74
    • Thomas, R.K.1    Sandhu, R.S.2
  • 12
    • 71149116148 scopus 로고
    • The well-founded semantics for general logic programs
    • July
    • A. van Gelder, K. Ross, and J.S. Schlipf, "The well-founded semantics for general logic programs," J. ACM, vol. 38, no. 3, pp. 620-650 July 1991.
    • (1991) J. ACM , vol.38 , Issue.3 , pp. 620-650
    • Van Gelder, A.1    Ross, K.2    Schlipf, J.S.3
  • 13
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • T.Y.C. Woo and S.S. Lam, "Authorizations in distributed systems: A new approach," J. Computer Security, vol. 2, nos. 2-3, pp. 107-136, 1993.
    • (1993) J. Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.