메뉴 건너뛰기




Volumn 8, Issue 1, 1996, Pages 3-15

A MAC policy framework for multilevel relational databases

Author keywords

Inference channel; Integrity constraints; Mandatory access control; Multilevel databases; Security label semantics; Security policy

Indexed keywords

COMPUTATIONAL LINGUISTICS; CONSTRAINT THEORY; DATA ACQUISITION; DATA STRUCTURES; SECURITY OF DATA;

EID: 0030087497     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/69.485625     Document Type: Article
Times cited : (23)

References (30)
  • 1
    • 33747516691 scopus 로고
    • Integrity and secrecy: Fundamental conflicts in the database environment
    • The MITRE Corporation
    • R.K. Burns, "Integrity and secrecy: Fundamental conflicts in the database environment," Proc. Third RADC Database Security Workshop, pp. 37-40. The MITRE Corporation, 1990.
    • (1990) Proc. Third RADC Database Security Workshop , pp. 37-40
    • Burns, R.K.1
  • 11
    • 0019608720 scopus 로고
    • Formal models for computer security
    • Sept.
    • C.E. Landwehr, "Formal models for computer security," ACM Computing Surveys, vol. 13, no. 3, pp. 247-278, Sept. 1981.
    • (1981) ACM Computing Surveys , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 14
    • 0002706043 scopus 로고
    • Integrity versus security in multilevel secure databases
    • C.E. Landwehr, ed., North-Holland
    • C. Meadows and S. Jajodia, "Integrity versus security in multilevel secure databases," Database Security: Status and Prospects, C.E. Landwehr, ed., pp. 89-101. North-Holland, 1988.
    • (1988) Database Security: Status and Prospects , pp. 89-101
    • Meadows, C.1    Jajodia, S.2
  • 15
    • 0027763892 scopus 로고
    • On the axiomatization of security policy: Some tentative observations about logic representation
    • B.M. Thuraisingham and C.E. Landwehr, eds., North-Holland
    • J.B. Michael, E.H. Sibley, R.F. Baum, and F. Li, "On the axiomatization of security policy: Some tentative observations about logic representation," Database Security, VI: Status and Prospects, B.M. Thuraisingham and C.E. Landwehr, eds., pp. 367-386. North-Holland, 1993.
    • (1993) Database Security, VI: Status and Prospects , pp. 367-386
    • Michael, J.B.1    Sibley, E.H.2    Baum, R.F.3    Li, F.4
  • 16
    • 0013623523 scopus 로고
    • The structure of permissions: A normative framework for access rights
    • C.E. Landwehr and S. Jajodia, eds., North-Holland
    • P. Morris and J. McDermid, "The structure of permissions: A normative framework for access rights," Database Security, V: Status and Prospects, C.E. Landwehr and S. Jajodia, eds., pp. 77-97. North-Holland, 1992.
    • (1992) Database Security, V: Status and Prospects , pp. 77-97
    • Morris, P.1    McDermid, J.2
  • 17
    • 0010054374 scopus 로고
    • Data base: Theory vs. interpretation
    • H. Gallaire and J. Minker, eds., Plenum Press
    • J.-M. Nicolas and H. Gallaire, "Data base: Theory vs. interpretation," Logic and Databases, H. Gallaire and J. Minker, eds., pp. 33-54. Plenum Press, 1978.
    • (1978) Logic and Databases , pp. 33-54
    • Nicolas, J.-M.1    Gallaire, H.2
  • 19
    • 0027990154 scopus 로고
    • Inference channel-free integrity constraints in multilevel relational databases
    • X. Qian, "Inference channel-free integrity constraints in multilevel relational databases," Proc. 1994 IEEE Symp. Research in Security and Privacy, pp. 158-167, 1994.
    • (1994) Proc. 1994 IEEE Symp. Research in Security and Privacy , pp. 158-167
    • Qian, X.1
  • 20
    • 0027763891 scopus 로고
    • Tuple-level vs. element-level classification
    • B.M. Thuraisingham and C.E. Landwehr, eds., North-Holland
    • X. Qian and T.F. Lunt, "Tuple-level vs. element-level classification," Database Security, VI: Status and Prospects, B.M. Thuraisingham and C.E. Landwehr, eds., pp. 301-315. North-Holland, 1993.
    • (1993) Database Security, VI: Status and Prospects , pp. 301-315
    • Qian, X.1    Lunt, T.F.2
  • 22
    • 33747501224 scopus 로고
    • Eliminating polyinstantiation securely
    • Oct.
    • R. Sandhu and S. Jajodia, "Eliminating polyinstantiation securely," Computers & Security, vol. 11, no. 6, pp. 547-562, Oct. 1992.
    • (1992) Computers & Security , vol.11 , Issue.6 , pp. 547-562
    • Sandhu, R.1    Jajodia, S.2
  • 24
    • 0004138558 scopus 로고
    • Use of an experimental policy workbench: Description and preliminary results
    • C.E. Landwehr and S. Jajodia, eds., North-Holland
    • E.H. Sibley, J.B. Michael, and R.L. Wexelblat, "Use of an experimental policy workbench: Description and preliminary results," Database Security, V: Status and Prospects, C.E. Landwehr and S. Jajodia, eds., pp. 47-76. North-Holland, 1992.
    • (1992) Database Security, V: Status and Prospects , pp. 47-76
    • Sibley, E.H.1    Michael, J.B.2    Wexelblat, R.L.3
  • 25
    • 0026260025 scopus 로고
    • Modeling security-relevant data semantics
    • Nov.
    • G. Smith, "Modeling security-relevant data semantics," IEEE Trans. Software Engineering, vol. 17, no. 11, pp. 1,195-1,203, Nov. 1991.
    • (1991) IEEE Trans. Software Engineering , vol.17 , Issue.11
    • Smith, G.1
  • 27
    • 0027767268 scopus 로고
    • Support for security modeling in information systems design
    • B.M. Thuraisingham and C.E. Landwehr, eds., North-Holland
    • G. Steinke and M. Jarke, "Support for security modeling in information systems design," Database Security, VI: Status and Prospects, B.M. Thuraisingham and C.E. Landwehr, eds., pp. 125-141. North-Holland, 1993.
    • (1993) Database Security, VI: Status and Prospects , pp. 125-141
    • Steinke, G.1    Jarke, M.2
  • 28
    • 33747486880 scopus 로고
    • A nonmonotonic typed multilevel logic for multilevel secure database/knowledge-base management systems
    • B.M. Thuraisingham, "A nonmonotonic typed multilevel logic for multilevel secure database/knowledge-base management systems," Proc. Fourth IEEE Workshop Computer Security Foundations, pp. 127-138, 1991.
    • (1991) Proc. Fourth IEEE Workshop Computer Security Foundations , pp. 127-138
    • Thuraisingham, B.M.1
  • 30
    • 33747495804 scopus 로고
    • Control of confidentiality in databases
    • Oct.
    • S.R. Wiseman, "Control of confidentiality in databases," Computers & Security, vol. 9, no. 6, pp. 529-537, Oct. 1990.
    • (1990) Computers & Security , vol.9 , Issue.6 , pp. 529-537
    • Wiseman, S.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.