메뉴 건너뛰기




Volumn 9, Issue 4, 1997, Pages 524-538

Information flow control in object-oriented systems

Author keywords

Discretionary access control; Distributed processing; Mandatory access control; Object oriented databases and systems; Security; Trojan horse

Indexed keywords

ALGORITHMS; COMPUTER VIRUSES; DATA HANDLING; ERROR CORRECTION; INFORMATION MANAGEMENT; OBJECT ORIENTED PROGRAMMING; SECURITY OF DATA;

EID: 0031185890     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/69.617048     Document Type: Article
Times cited : (63)

References (17)
  • 2
    • 30244432907 scopus 로고
    • Technical Report 404, Privacy and Security in Computer Systems, Nat'l Bureau of Standard Special Publication
    • H.W. Bingham, "Access Controls in Burroughs Large Systems," Technical Report 404, Privacy and Security in Computer Systems, Nat'l Bureau of Standard Special Publication, 1974.
    • (1974) Access Controls in Burroughs Large Systems
    • Bingham, H.W.1
  • 3
    • 33748210906 scopus 로고
    • A Partial Solution to the Discretionary Trojan Horse Problem
    • Gaithersburg, Md.
    • W.E. Boebert and C.T. Ferguson, "A Partial Solution to the Discretionary Trojan Horse Problem," Proc. Eighth Nat'l Computer Security Conf., pp. 141-144, Gaithersburg, Md., 1985.
    • (1985) Proc. Eighth Nat'l Computer Security Conf. , pp. 141-144
    • Boebert, W.E.1    Ferguson, C.T.2
  • 6
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • D.E. Denning, "A Lattice Model of Secure Information Flow," Comm. ACM, pp. 236-243, May 1976.
    • (1976) Comm. ACM , pp. 236-243
    • Denning, D.E.1
  • 7
    • 1242349398 scopus 로고
    • On the Need for a Third Form of Access Control
    • Gaithersburg, Md.
    • R. Graubart, "On the Need for a Third Form of Access Control," Proc. 12th Nat'l Computer Security Conf., pp. 296-303, Gaithersburg, Md., 1989.
    • (1989) Proc. 12th Nat'l Computer Security Conf. , pp. 296-303
    • Graubart, R.1
  • 8
    • 0025065897 scopus 로고
    • Integrating an Object-Oriented Data Model with Multilevel Security
    • Oakland, Calif.
    • S. Jajodia and B. Kogan, "Integrating an Object-Oriented Data Model with Multilevel Security," Proc. IEEE Symp. Security and Privacy, pp. 76-85, Oakland, Calif., 1990.
    • (1990) Proc. IEEE Symp. Security and Privacy , pp. 76-85
    • Jajodia, S.1    Kogan, B.2
  • 10
    • 0023168930 scopus 로고
    • Limiting the Damage Potential of Discretionary Trojan Horses
    • Oakland, Calif.
    • P.A. Karger, "Limiting the Damage Potential of Discretionary Trojan Horses," Proc. IEEE Symp. Security and Privacy, pp. 32-37, Oakland, Calif., 1987.
    • (1987) Proc. IEEE Symp. Security and Privacy , pp. 32-37
    • Karger, P.A.1
  • 11
    • 0026155431 scopus 로고
    • Discretionary Access Controls in a High-Performance Object Management System
    • Oakland, Calif.
    • U. Kelter, "Discretionary Access Controls in a High-Performance Object Management System," Proc. IEEE Symp. Security and Privacy, pp. 288-299, Oakland, Calif., 1991.
    • (1991) Proc. IEEE Symp. Security and Privacy , pp. 288-299
    • Kelter, U.1
  • 12
    • 33748164892 scopus 로고
    • A Comparison of Object Models in ODBMS-Related Standards
    • Dec.
    • F. Manola and G. Mitchell, "A Comparison of Object Models in ODBMS-Related Standards," IEEE Data Eng. Bull., vol. 17, pp. 27-35, Dec. 1994.
    • (1994) IEEE Data Eng. Bull. , vol.17 , pp. 27-35
    • Manola, F.1    Mitchell, G.2
  • 14
    • 33748165340 scopus 로고
    • Supporting Timing Channel Free Computations in Multilevel Secure Object-Oriented Databases
    • C.E. Landwehr and S. Jajodia, eds., North-Holland
    • R.S. Sandhu, R. Thomas, and S. Jajodia, "Supporting Timing Channel Free Computations in Multilevel Secure Object-Oriented Databases," C.E. Landwehr and S. Jajodia, eds., Database Security, V: Status and Prospects, pp. 297-314, North-Holland, 1992.
    • (1992) Database Security, V: Status and Prospects , pp. 297-314
    • Sandhu, R.S.1    Thomas, R.2    Jajodia, S.3
  • 15
    • 0019658399 scopus 로고
    • Access Flow: A Protection Model which Integrates Access Control and Information Flow
    • Oakland, Calif.
    • A. Stoughton, "Access Flow: A Protection Model which Integrates Access Control and Information Flow," Proc. IEEE Symp. Security and Privacy, pp. 9-18, Oakland, Calif., 1981.
    • (1981) Proc. IEEE Symp. Security and Privacy , pp. 9-18
    • Stoughton, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.