-
1
-
-
0041379357
-
A possibility theory framework for security evaluation in national infrastructure protection
-
Baskerville, R., & Portougal, V. (2003). A possibility theory framework for security evaluation in national infrastructure protection. Journal of Database Management, 14(2), 1-13.
-
(2003)
Journal of Database Management
, vol.14
, Issue.2
, pp. 1-13
-
-
Baskerville, R.1
Portougal, V.2
-
2
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
MITRE Corporation
-
Bell, D.E., & LaPadula, L.J. (1974). Secure computer systems: Mathematical foundations and model. Technical Report. MITRE Corporation.
-
(1974)
Technical Report
-
-
Bell, D.E.1
Lapadula, L.J.2
-
5
-
-
0011646138
-
A multi-level relational data model
-
Oakland, California
-
Denning, D.E., & Lunt, T.F. (1987). A multi-level relational data model. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, (pp. 218-233).
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 218-233
-
-
Denning, D.E.1
Lunt, T.F.2
-
6
-
-
0041901780
-
Cover stories for database security
-
S. Jajodia, & C.E. Landwehr (Eds.), North-Holland, MI: Elsevier Science
-
Garvey, T.D., & Lunt, T.F. (1992). Cover stories for database security. In S. Jajodia, & C.E. Landwehr (Eds.), Database security V: Status and prospects. North-Holland, MI: Elsevier Science.
-
(1992)
Database Security V: Status and Prospects
-
-
Garvey, T.D.1
Lunt, T.F.2
-
7
-
-
0029386356
-
Enriching the expressive power of security label
-
Gong, L., & Qian, X. (1995). Enriching the expressive power of security label. IEEE Transactions on Knowledge and Data Engineering, 7(5), 839-841.
-
(1995)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, Issue.5
, pp. 839-841
-
-
Gong, L.1
Qian, X.2
-
8
-
-
0009431182
-
The LDV secure relational DBMS model
-
S. Jajodia, & C.E. Landwehr (Eds.), North-Holland, MI: Elsevier Science
-
Haigh, J.T., O'Brien, R.C., & Thomasen, D.J. (1991). The LDV secure relational DBMS model. In S. Jajodia, & C.E. Landwehr (Eds.), Database security V: Status and prospects (pp. 265-279). North-Holland, MI: Elsevier Science.
-
(1991)
Database Security V: Status and Prospects
, pp. 265-279
-
-
Haigh, J.T.1
O'Brien, R.C.2
Thomasen, D.J.3
-
9
-
-
0025065653
-
Polyinstantiation integrity in multi-level relations
-
Oakland, California
-
Jajodia, S., & Sandhu, R. (1990). Polyinstantiation integrity in multi-level relations. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, (pp. 104-115).
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 104-115
-
-
Jajodia, S.1
Sandhu, R.2
-
10
-
-
84976698642
-
Toward a multi-level secure relational data model
-
Denver, Colorado
-
Jajodia, S., & Sandhu, R. (1991). Toward a multi-level secure relational data model. Proceedings of the ACM SIGMOD, Denver, Colorado, (pp. 50-59).
-
(1991)
Proceedings of the ACM SIGMOD
, pp. 50-59
-
-
Jajodia, S.1
Sandhu, R.2
-
11
-
-
19944386389
-
Solutions to the polyinstantiation problem, essay 21 of information security
-
M. Abrams, S. Jajodia, & H. Podell (Eds.), Los Alamitos, CA: IEEE Computer Security Press
-
Jajodia, S., Sandhu, R., & Blaustein, B.T. (1995). Solutions to the polyinstantiation problem, essay 21 of information security. In M. Abrams, S. Jajodia, & H. Podell (Eds.), An integrated collection of essays. Los Alamitos, CA: IEEE Computer Security Press.
-
(1995)
An Integrated Collection of Essays
-
-
Jajodia, S.1
Sandhu, R.2
Blaustein, B.T.3
-
12
-
-
14344260153
-
Closing the key-loophole in MLS databases
-
Jukic, N., Nestorov, S., & Vrbsky, S. (2003). Closing the key-loophole in MLS databases. ACM SIGMOD Record, 32(2), 15-20.
-
(2003)
ACM SIGMOD Record
, vol.32
, Issue.2
, pp. 15-20
-
-
Jukic, N.1
Nestorov, S.2
Vrbsky, S.3
-
13
-
-
0033165020
-
A belief-consistent multi-level secure relational data model
-
Jukic, N., Vrbsky, S., Parrish A., Dixon B., & Juki, B. (1999). A belief-consistent multi-level secure relational data model. Information Systems, 24(5), 377-402.
-
(1999)
Information Systems
, vol.24
, Issue.5
, pp. 377-402
-
-
Jukic, N.1
Vrbsky, S.2
Parrish, A.3
Dixon, B.4
Juki, B.5
-
15
-
-
0029210555
-
The semantics and expressive power of the MLR data model
-
Oakland, California
-
Sandhu, R., & Chen, F. (1995). The semantics and expressive power of the MLR data model. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, (pp. 128-143).
-
(1995)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 128-143
-
-
Sandhu, R.1
Chen, F.2
-
16
-
-
0001957802
-
The multilevel relational (MLR) data model
-
Sandhu, R., & Chen, F. (1998). The multilevel relational (MLR) data model. Transactions on Information and System Security, 7(1), 93-132.
-
(1998)
Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 93-132
-
-
Sandhu, R.1
Chen, F.2
-
18
-
-
0009363060
-
TOP: A practical trusted ODMS
-
Baltimore, Maryland
-
Schaefer, M., Lyons, V.A., Martel, P.A., & Kanawati, A. (1995). TOP: A practical trusted ODMS. Proceedings of the Eighteenth National Information Systems Security Conference, Baltimore, Maryland, (pp. 50-62).
-
(1995)
Proceedings of the Eighteenth National Information Systems Security Conference
, pp. 50-62
-
-
Schaefer, M.1
Lyons, V.A.2
Martel, P.A.3
Kanawati, A.4
-
19
-
-
0002099291
-
Entity modeling in the MLS relational model
-
Vancouver, British Columbia
-
Smith, K., & Winslett, M. (1992). Entity modeling in the MLS relational model. Proceedings of the Eighteenth VLDB Conference, Vancouver, British Columbia, (pp. 199-210).
-
(1992)
Proceedings of the Eighteenth VLDB Conference
, pp. 199-210
-
-
Smith, K.1
Winslett, M.2
-
20
-
-
0028720693
-
Formal query languages for secure relational databases
-
Winslett, M., Smith, K., & Qian, X. (1994). Formal query languages for secure relational databases. ACM Transactions on Database Systems, 79(4), 626-662.
-
(1994)
ACM Transactions on Database Systems
, vol.79
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
|