메뉴 건너뛰기




Volumn 47, Issue 7, 2005, Pages 463-477

Designing secure databases

Author keywords

Database design; Object Constraint Language; Secure databases; Unified Modeling Language

Indexed keywords

DATA PROCESSING; HIERARCHICAL SYSTEMS; MATHEMATICAL MODELS; SECURITY OF DATA; SEMANTICS; XML;

EID: 16344386616     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2004.09.013     Document Type: Article
Times cited : (33)

References (38)
  • 3
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • R. Baskerville Information systems security design methods: implications for information systems development ACM Computing Surveys 25 4 1993 375 415
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-415
    • Baskerville, R.1
  • 8
    • 16344386685 scopus 로고
    • What Is There to Worry About? An Introduction to the Computer Security Problem
    • M. Abrams S. Jajodia H. Podell IEEE Computer Society Silver Spring, MD
    • D. Brinkley, and R. Schell What Is There to Worry About? An Introduction to the Computer Security Problem M. Abrams S. Jajodia H. Podell Information Security, An Integrated Collection of Essays 1995 IEEE Computer Society Silver Spring, MD
    • (1995) Information Security, An Integrated Collection of Essays
    • Brinkley, D.1    Schell, R.2
  • 13
    • 84970947585 scopus 로고    scopus 로고
    • Software engineering for security: A roadmap
    • A. Finkelstein ACM Press New York
    • P. Devanbu, and S. Stubblebine Software engineering for security: a roadmap A. Finkelstein The Future of Software Engineering 2000 ACM Press New York 227 239
    • (2000) The Future of Software Engineering , pp. 227-239
    • Devanbu, P.1    Stubblebine, S.2
  • 15
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • G. Dhillon, and J. Backhouse Information system security management in the new millennium Communications of the ACM 43 7 2000 125 128
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 16
    • 16344387616 scopus 로고    scopus 로고
    • Directive, Directive 95/46/CE of the European Parliament and Council, dated October 24th, about People protection regarding the personal data management and the free circulation of these data, DOCE L281, 23/11/1995 (95/46/CE) 0031-0050
    • Directive, Directive 95/46/CE of the European Parliament and Council, dated October 24th, about People protection regarding the personal data management and the free circulation of these data, DOCE L281, 23/11/1995 (95/46/CE) 0031-0050.
  • 21
    • 0036145519 scopus 로고    scopus 로고
    • Building software securely from the ground up
    • A. Ghosh, C. Howell, and J. Whittaker Building software securely from the ground up IEEE Software 19 1 2002 14 17
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 14-17
    • Ghosh, A.1    Howell, C.2    Whittaker, J.3
  • 22
    • 0036149234 scopus 로고    scopus 로고
    • Correctness by construction developing a commercial secure system
    • A. Hall, and R. Chapman Correctness by construction developing a commercial secure system IEEE Software 19 1 2002 18 25
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 18-25
    • Hall, A.1    Chapman, R.2
  • 24
    • 16344376670 scopus 로고    scopus 로고
    • Information Security Governance Information Systems Audit and Control Foundation, USA
    • ISACF, Information Security Governance. Guidance for Boards of Directors and Executive Management, Information Systems Audit and Control Foundation, USA, 2001.
    • (2001) Guidance for Boards of Directors and Executive Management
  • 28
    • 0006973722 scopus 로고    scopus 로고
    • Whatever happened to Object-Oriented Databases?
    • N. Leavitt Whatever happened to Object-Oriented Databases? Industry Trends. IEEE Computer Society 33 8 2000 16 19
    • (2000) Industry Trends. IEEE Computer Society , vol.33 , Issue.8 , pp. 16-19
    • Leavitt, N.1
  • 30
    • 0030195327 scopus 로고    scopus 로고
    • MOMT: A multi-level object modeling technique for designing secure database applications
    • D. Marks, P. Sell, and B. Thuraisingham MOMT: a multi-level object modeling technique for designing secure database applications Journal of Object-Oriented Programming 9 4 1996 22 29
    • (1996) Journal of Object-Oriented Programming , vol.9 , Issue.4 , pp. 22-29
    • Marks, D.1    Sell, P.2    Thuraisingham, B.3
  • 31
    • 16344381436 scopus 로고    scopus 로고
    • Database Design for Smarties
    • Morgan Kaufmann Publisher San Francisco, CA
    • R. Muller Database Design for Smarties Using UML for Data Modeling 1999 Morgan Kaufmann Publisher San Francisco, CA
    • (1999) Using UML for Data Modeling
    • Muller, R.1
  • 36


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.