-
1
-
-
33747516691
-
Integrity and secrecy: Fundamental conflicts in the database environment
-
The MITRE Corporation
-
R.K. Burns, "Integrity and secrecy: Fundamental conflicts in the database environment," Proc. Third RADC Database Security Workshop, pp. 37-40. The MITRE Corporation, 1990.
-
(1990)
Proc. Third RADC Database Security Workshop
, pp. 37-40
-
-
Burns, R.K.1
-
5
-
-
0026900438
-
A logic for reasoning about security
-
Aug.
-
J. Glasgow, G. MacEwen, and P. Panangaden, "A logic for reasoning about security," ACM Trans. Computer Systems, vol. 10, no. 3, pp. 226-264, Aug. 1992.
-
(1992)
ACM Trans. Computer Systems
, vol.10
, Issue.3
, pp. 226-264
-
-
Glasgow, J.1
MacEwen, G.2
Panangaden, P.3
-
7
-
-
0009431182
-
The LDV secure relational DBMS model
-
S. Jajodia and C.E. Landwehr, eds., North-Holland
-
J.T. Haigh, R.C. O'Brien, and D.J. Thomsen, "The LDV secure relational DBMS model," Database Security, IV: Status and Prospects, S. Jajodia and C.E. Landwehr, eds., pp. 265-279. North-Holland, 1991.
-
(1991)
Database Security, IV: Status and Prospects
, pp. 265-279
-
-
Haigh, J.T.1
O'Brien, R.C.2
Thomsen, D.J.3
-
11
-
-
0019608720
-
Formal models for computer security
-
Sept.
-
C.E. Landwehr, "Formal models for computer security," ACM Computing Surveys, vol. 13, no. 3, pp. 247-278, Sept. 1981.
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
12
-
-
0025442003
-
The Seaview security model
-
June
-
T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman, and W.R. Shockley, "The Seaview security model," IEEE Trans. Software Engineering, vol. 16, no. 6, pp. 593-607, June 1990.
-
(1990)
IEEE Trans. Software Engineering
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
13
-
-
25944433853
-
-
Technical Report RADC-TR-89-313, Rome Air Development Center, Air Force Systems Command, Dec.
-
T.F. Lunt, P.G. Neumann, D.E. Denning, R.R. Schell, M. Heckman, and W.R. Shockley, "Secure distributed data views: Security policy and interpretation for DBMS for a class A1 DBMS," Technical Report RADC-TR-89-313, vol. 1, Rome Air Development Center, Air Force Systems Command, Dec. 1989.
-
(1989)
Secure Distributed Data Views: Security Policy and Interpretation for DBMS for a Class A1 DBMS
, vol.1
-
-
Lunt, T.F.1
Neumann, P.G.2
Denning, D.E.3
Schell, R.R.4
Heckman, M.5
Shockley, W.R.6
-
14
-
-
0002706043
-
Integrity versus security in multilevel secure databases
-
C.E. Landwehr, ed., North-Holland
-
C. Meadows and S. Jajodia, "Integrity versus security in multilevel secure databases," Database Security: Status and Prospects, C.E. Landwehr, ed., pp. 89-101. North-Holland, 1988.
-
(1988)
Database Security: Status and Prospects
, pp. 89-101
-
-
Meadows, C.1
Jajodia, S.2
-
15
-
-
0027763892
-
On the axiomatization of security policy: Some tentative observations about logic representation
-
B.M. Thuraisingham and C.E. Landwehr, eds., North-Holland
-
J.B. Michael, E.H. Sibley, R.F. Baum, and F. Li, "On the axiomatization of security policy: Some tentative observations about logic representation," Database Security, VI: Status and Prospects, B.M. Thuraisingham and C.E. Landwehr, eds., pp. 367-386. North-Holland, 1993.
-
(1993)
Database Security, VI: Status and Prospects
, pp. 367-386
-
-
Michael, J.B.1
Sibley, E.H.2
Baum, R.F.3
Li, F.4
-
16
-
-
0013623523
-
The structure of permissions: A normative framework for access rights
-
C.E. Landwehr and S. Jajodia, eds., North-Holland
-
P. Morris and J. McDermid, "The structure of permissions: A normative framework for access rights," Database Security, V: Status and Prospects, C.E. Landwehr and S. Jajodia, eds., pp. 77-97. North-Holland, 1992.
-
(1992)
Database Security, V: Status and Prospects
, pp. 77-97
-
-
Morris, P.1
McDermid, J.2
-
17
-
-
0010054374
-
Data base: Theory vs. interpretation
-
H. Gallaire and J. Minker, eds., Plenum Press
-
J.-M. Nicolas and H. Gallaire, "Data base: Theory vs. interpretation," Logic and Databases, H. Gallaire and J. Minker, eds., pp. 33-54. Plenum Press, 1978.
-
(1978)
Logic and Databases
, pp. 33-54
-
-
Nicolas, J.-M.1
Gallaire, H.2
-
19
-
-
0027990154
-
Inference channel-free integrity constraints in multilevel relational databases
-
X. Qian, "Inference channel-free integrity constraints in multilevel relational databases," Proc. 1994 IEEE Symp. Research in Security and Privacy, pp. 158-167, 1994.
-
(1994)
Proc. 1994 IEEE Symp. Research in Security and Privacy
, pp. 158-167
-
-
Qian, X.1
-
20
-
-
0027763891
-
Tuple-level vs. element-level classification
-
B.M. Thuraisingham and C.E. Landwehr, eds., North-Holland
-
X. Qian and T.F. Lunt, "Tuple-level vs. element-level classification," Database Security, VI: Status and Prospects, B.M. Thuraisingham and C.E. Landwehr, eds., pp. 301-315. North-Holland, 1993.
-
(1993)
Database Security, VI: Status and Prospects
, pp. 301-315
-
-
Qian, X.1
Lunt, T.F.2
-
22
-
-
33747501224
-
Eliminating polyinstantiation securely
-
Oct.
-
R. Sandhu and S. Jajodia, "Eliminating polyinstantiation securely," Computers & Security, vol. 11, no. 6, pp. 547-562, Oct. 1992.
-
(1992)
Computers & Security
, vol.11
, Issue.6
, pp. 547-562
-
-
Sandhu, R.1
Jajodia, S.2
-
23
-
-
0025694646
-
A new polyinstantiation integrity constraint for multilevel relations
-
R. Sandhu, S. Jajodia, and T.F. Lunt, "A new polyinstantiation integrity constraint for multilevel relations," Proc. Third IEEE Workshop Computer Security Foundations, pp. 159-165, 1990.
-
(1990)
Proc. Third IEEE Workshop Computer Security Foundations
, pp. 159-165
-
-
Sandhu, R.1
Jajodia, S.2
Lunt, T.F.3
-
24
-
-
0004138558
-
Use of an experimental policy workbench: Description and preliminary results
-
C.E. Landwehr and S. Jajodia, eds., North-Holland
-
E.H. Sibley, J.B. Michael, and R.L. Wexelblat, "Use of an experimental policy workbench: Description and preliminary results," Database Security, V: Status and Prospects, C.E. Landwehr and S. Jajodia, eds., pp. 47-76. North-Holland, 1992.
-
(1992)
Database Security, V: Status and Prospects
, pp. 47-76
-
-
Sibley, E.H.1
Michael, J.B.2
Wexelblat, R.L.3
-
25
-
-
0026260025
-
Modeling security-relevant data semantics
-
Nov.
-
G. Smith, "Modeling security-relevant data semantics," IEEE Trans. Software Engineering, vol. 17, no. 11, pp. 1,195-1,203, Nov. 1991.
-
(1991)
IEEE Trans. Software Engineering
, vol.17
, Issue.11
-
-
Smith, G.1
-
27
-
-
0027767268
-
Support for security modeling in information systems design
-
B.M. Thuraisingham and C.E. Landwehr, eds., North-Holland
-
G. Steinke and M. Jarke, "Support for security modeling in information systems design," Database Security, VI: Status and Prospects, B.M. Thuraisingham and C.E. Landwehr, eds., pp. 125-141. North-Holland, 1993.
-
(1993)
Database Security, VI: Status and Prospects
, pp. 125-141
-
-
Steinke, G.1
Jarke, M.2
-
28
-
-
33747486880
-
A nonmonotonic typed multilevel logic for multilevel secure database/knowledge-base management systems
-
B.M. Thuraisingham, "A nonmonotonic typed multilevel logic for multilevel secure database/knowledge-base management systems," Proc. Fourth IEEE Workshop Computer Security Foundations, pp. 127-138, 1991.
-
(1991)
Proc. Fourth IEEE Workshop Computer Security Foundations
, pp. 127-138
-
-
Thuraisingham, B.M.1
-
30
-
-
33747495804
-
Control of confidentiality in databases
-
Oct.
-
S.R. Wiseman, "Control of confidentiality in databases," Computers & Security, vol. 9, no. 6, pp. 529-537, Oct. 1990.
-
(1990)
Computers & Security
, vol.9
, Issue.6
, pp. 529-537
-
-
Wiseman, S.R.1
|