-
1
-
-
0024304651
-
Efficient implementation of lattice operations
-
H. Aït-Kaci, R. Boyer, P. Lincoln, and R. Nasr, Efficient implementation of lattice operations, ACM Trans. Program. Lang. Systems 11 (1989), 115-146.
-
(1989)
ACM Trans. Program. Lang. Systems
, vol.11
, pp. 115-146
-
-
Aït-Kaci, H.1
Boyer, R.2
Lincoln, P.3
Nasr, R.4
-
2
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
The Mitre Corporation, March
-
D. E. Bell and L. J. LaPadula, Secure computer systems: Unified exposition and Multics interpretation, Technical report, The Mitre Corporation, March 1976.
-
(1976)
Technical Report
-
-
Bell, D.E.1
LaPadula, L.J.2
-
3
-
-
0004190705
-
-
Addison-Wesley, Reading, MA
-
S. Castano, M. G. Fugini, G. Martella, and P. Samarati, "Database Security," Addison-Wesley, Reading, MA, 1995.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.G.2
Martella, G.3
Samarati, P.4
-
4
-
-
0004116989
-
-
McGraw-Hill, New York
-
T. H. Cormen, C. E. Leiserson, and R. L. Rivest, "Introduction to Algorithms," McGraw-Hill, New York, 1990.
-
(1990)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
-
5
-
-
0032690110
-
Minimal data upgrading to prevent inference and association attacks
-
Philadelphia, PA, May 31-June 3
-
S. Dawson, S. De Capitani di Vimercati, P. Lincoln, and P. Samarati, Minimal data upgrading to prevent inference and association attacks, in "Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS)," Philadelphia, PA, May 31-June 3, 1999.
-
(1999)
Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS)
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Lincoln, P.3
Samarati, P.4
-
6
-
-
0032657567
-
Specification and enforcement of classification and inference constraints
-
Oakland, CA, May
-
S. Dawson, S. De Capitani di Vimercati, and P. Samarati, Specification and enforcement of classification and inference constraints, in "Proc. of the 20th IEEE Symposium on Security and Privacy," pp. 181-195, Oakland, CA, May 1999.
-
(1999)
Proc. of the 20th IEEE Symposium on Security and Privacy
, pp. 181-195
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
7
-
-
0030085404
-
Wizard: A database inference analysis and detection system
-
H. S. Delugach and T. H. Hinke, Wizard: A database inference analysis and detection system, IEEE Trans. Knowledge Data Engrg. 8 (1996), 56-66.
-
(1996)
IEEE Trans. Knowledge Data Engrg.
, vol.8
, pp. 56-66
-
-
Delugach, H.S.1
Hinke, T.H.2
-
8
-
-
85030825941
-
-
Department of Defense, National Computer Security Center, "Department of Defense Trusted Computer System Evaluation Criteria," Standard DOD 5200.28-STD, 1985
-
Department of Defense, National Computer Security Center, "Department of Defense Trusted Computer System Evaluation Criteria," Standard DOD 5200.28-STD, 1985.
-
-
-
-
9
-
-
0028518126
-
A space-and-time-efficient coding algorithm for lattice computations
-
D. D. Ganguly, C. K. Mohan, and S. Ranka, A space-and-time-efficient coding algorithm for lattice computations, IEEE Trans. Knowledge Data Engrg. 6 (1994), 819-829.
-
(1994)
IEEE Trans. Knowledge Data Engrg.
, vol.6
, pp. 819-829
-
-
Ganguly, D.D.1
Mohan, C.K.2
Ranka, S.3
-
10
-
-
0009431182
-
The LDV secure relational DBMS model
-
S. Jajodia and C. E. Landwehr, Eds., North-Holland, Amsterdam
-
J. T. Haigh, R. C. O'Brien, and D. J. Thomsen, The LDV secure relational DBMS model, in "Database Security, IV: Status and Prospects" (S. Jajodia and C. E. Landwehr, Eds.), pp. 265-279, North-Holland, Amsterdam, 1991.
-
(1991)
Database Security, IV: Status and Prospects
, pp. 265-279
-
-
Haigh, J.T.1
O'Brien, R.C.2
Thomsen, D.J.3
-
11
-
-
0030681774
-
Catalytic inference analysis: Detecting inference threats due to knowledge discovery
-
Oakland, CA, May
-
J. Hale and S. Shenoi, Catalytic inference analysis: Detecting inference threats due to knowledge discovery, in "Proc. of the 1997 IEEE Symposium on Security and Privacy," pp. 188-199, Oakland, CA, May 1997.
-
(1997)
Proc. of the 1997 IEEE Symposium on Security and Privacy
, pp. 188-199
-
-
Hale, J.1
Shenoi, S.2
-
12
-
-
0023861339
-
Inference aggregation detection in database management systems
-
Oakland, CA, April
-
T. Hinke, Inference aggregation detection in database management systems, in "Proc. of the IEEE Symposium on Research in Security and Privacy, " pp. 96-107, Oakland, CA, April 1988.
-
(1988)
Proc. of the IEEE Symposium on Research in Security and Privacy
, pp. 96-107
-
-
Hinke, T.1
-
13
-
-
0007664281
-
Inference problems in multilevel secure database management systems
-
M. D. Abrams, S. Jajodia, and H. J. Podell, Eds., IEEE Computer Society Press, Los Alamitos, CA
-
S. Jajodia and C. Meadows, Inference problems in multilevel secure database management systems, in "Information Security - An Integrated Collection of Essays" (M. D. Abrams, S. Jajodia, and H. J. Podell, Eds.), pp. 570-584, IEEE Computer Society Press, Los Alamitos, CA, 1995.
-
(1995)
Information Security - An Integrated Collection of Essays
, pp. 570-584
-
-
Jajodia, S.1
Meadows, C.2
-
15
-
-
0024663399
-
Aggregation and inference: Facts and fallacies
-
Oakland, CA, May
-
T. F. Lunt, Aggregation and inference: Facts and fallacies, in "Proc. of the IEEE Symposium on Security and Privacy," pp. 102-109, Oakland, CA, May 1989.
-
(1989)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 102-109
-
-
Lunt, T.F.1
-
16
-
-
0025442003
-
The Seaview security model
-
T. F. Lunt, D. E. Denning, R. R. Schell, M. Heckman, and W. R. Shockley, The SeaView security model, IEEE Trans. Software Engrg. 16 (1990), 593-607.
-
(1990)
IEEE Trans. Software Engrg.
, vol.16
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
18
-
-
0025135715
-
Extending the Brewer-Nash model to a multilevel context
-
Oakland, CA, May
-
C. Meadows, Extending the Brewer-Nash model to a multilevel context, in "Proc. of the 1990 IEEE Symposium on Research in Security and Privacy," pp. 95-102, Oakland, CA, May 1990.
-
(1990)
Proc. of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 95-102
-
-
Meadows, C.1
-
19
-
-
10644286156
-
Models of multilevel computer security
-
The Mitre Corporation
-
J. K. Millen, Models of multilevel computer security, Technical Report MTR-10537, The Mitre Corporation, 1989. Also in Adv. Comput. 29 (1989), 1-45.
-
(1989)
Technical Report MTR-10537
-
-
Millen, J.K.1
-
20
-
-
10644230604
-
-
J. K. Millen, Models of multilevel computer security, Technical Report MTR-10537, The Mitre Corporation, 1989. Also in Adv. Comput. 29 (1989), 1-45.
-
(1989)
Adv. Comput.
, vol.29
, pp. 1-45
-
-
-
21
-
-
84976785631
-
Security and inference in multilevel database and knowledge-base systems
-
San Francisco, CA, May
-
M. Morgenstern, Security and inference in multilevel database and knowledge-base systems, in "Proc. of the 1987 ACM SIGMOD Conference," pp. 357-373, San Francisco, CA, May 1987.
-
(1987)
Proc. of the 1987 ACM SIGMOD Conference
, pp. 357-373
-
-
Morgenstern, M.1
-
22
-
-
10644228227
-
Enhancing the controlled disclosure of sensitive information
-
Rome, Italy, September
-
A. Motro, D. G. Marks, and S. Jajodia, Enhancing the controlled disclosure of sensitive information, in "Proc. of the Fourth European Symposium on Research in Security and Privacy," pp. 290-303, Rome, Italy, September 1996.
-
(1996)
Proc. of the Fourth European Symposium on Research in Security and Privacy
, pp. 290-303
-
-
Motro, A.1
Marks, D.G.2
Jajodia, S.3
-
23
-
-
0030281821
-
Satisfiability of inequalities in a poset
-
V. R. Pratt and J. Tiuryn, Satisfiability of inequalities in a poset, Fund. Inform. 28 (1996), 165-182.
-
(1996)
Fund. Inform.
, vol.28
, pp. 165-182
-
-
Pratt, V.R.1
Tiuryn, J.2
-
24
-
-
0030087497
-
A MAC policy framework for multilevel relational databases
-
X. Qian and T. F. Lunt, A MAC policy framework for multilevel relational databases, IEEE Trans. Knowledge Data Engrg. 8 (1996), 1-14.
-
(1996)
IEEE Trans. Knowledge Data Engrg.
, vol.8
, pp. 1-14
-
-
Qian, X.1
Lunt, T.F.2
-
25
-
-
0027208502
-
Detection and elimination of inference channels in multilevel relational databases
-
Oakland, CA, May
-
X. Qian, M. E. Stickel, P. D. Karp, T. F. Lunt, and T. D. Garvey, Detection and elimination of inference channels in multilevel relational databases, in "Proc. of the 1993 IEEE Symposium on Research in Security and Privacy," pp. 196-205, Oakland, CA, May 1993.
-
(1993)
Proc. of the 1993 IEEE Symposium on Research in Security and Privacy
, pp. 196-205
-
-
Qian, X.1
Stickel, M.E.2
Karp, P.D.3
Lunt, T.F.4
Garvey, T.D.5
-
26
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
Foundations of Security Analysis and Design R. Focardi and R. Gorrieri, Eds., Springer-Verlag, Berlin
-
P. Samarati and S. De Capitani di Vimercati, Access control: Policies, models, and mechanisms, in "Foundations of Security Analysis and Design" (R. Focardi and R. Gorrieri, Eds.), Lecture Notes of Computer Science 2171, Springer-Verlag, Berlin, 2001.
-
(2001)
Lecture Notes of Computer Science
, vol.2171
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
28
-
-
0020718929
-
Answering queries without revealing secrets
-
G. L. Sicherman, W. de Jonge, and R. P. van de Riet, Answering queries without revealing secrets, ACM Trans. Database System 8 (1983), 41-59.
-
(1983)
ACM Trans. Database System
, vol.8
, pp. 41-59
-
-
Sicherman, G.L.1
De Jonge, W.2
Van De Riet, R.P.3
-
29
-
-
0025152631
-
Modeling security-relevant data semantics
-
Oakland, CA, May
-
G. W. Smith, Modeling security-relevant data semantics, in "Proc. of the 1990 IEEE Symposium on Research in Security and Privacy," pp. 384-391, Oakland, CA, May 1990.
-
(1990)
Proc. of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 384-391
-
-
Smith, G.W.1
-
30
-
-
0028101713
-
Elimination of inference channels by optimal upgrading
-
Oakland, CA, May
-
M. E. Stickel, Elimination of inference channels by optimal upgrading, in "Proc. of the 1994 IEEE Symposium on Research in Security and Privacy," pp. 168-174, Oakland, CA, May 1994.
-
(1994)
Proc. of the 1994 IEEE Symposium on Research in Security and Privacy
, pp. 168-174
-
-
Stickel, M.E.1
-
31
-
-
0026367603
-
Controlling FD and MVD inferences in multilevel relational database systems
-
T. A. Su and G. Ozsoyoglu, Controlling FD and MVD inferences in multilevel relational database systems, IEEE Trans. Knowledge Data Engrg. 3 (1991), 474-485.
-
(1991)
IEEE Trans. Knowledge Data Engrg.
, vol.3
, pp. 474-485
-
-
Su, T.A.1
Ozsoyoglu, G.2
-
32
-
-
0031118370
-
A data structure for lattice representation
-
M. Talamo and P. Vocca, A data structure for lattice representation, Theoret. Comput. Sci. 175 (1997), 373-392.
-
(1997)
Theoret. Comput. Sci.
, vol.175
, pp. 373-392
-
-
Talamo, M.1
Vocca, P.2
-
33
-
-
0001790593
-
Depth-first search and linear graph algorithms
-
R. Tarjan, Depth-first search and linear graph algorithms, SIAM J. Comput. 1 (1972), 146-160.
-
(1972)
SIAM J. Comput.
, vol.1
, pp. 146-160
-
-
Tarjan, R.1
-
34
-
-
8844262749
-
The use of conceptual structures for handling the inference problem
-
C. E. Landwehr and S. Jajodia, Eds., North-Holland, Amsterdam
-
B. Thuraisingham, The use of conceptual structures for handling the inference problem, in "Database Security, V: Status and Prospects" (C. E. Landwehr and S. Jajodia, Eds.), pp. 333-362, North-Holland, Amsterdam, 1992.
-
(1992)
Database Security, V: Status and Prospects
, pp. 333-362
-
-
Thuraisingham, B.1
-
35
-
-
0029290760
-
Security constraint processing in a multilevel secure distributed database management system
-
B. Thuraisingham and W. Ford, Security constraint processing in a multilevel secure distributed database management system, IEEE Trans. Knowledge Data Engrg. 7 (1995), 274-293.
-
(1995)
IEEE Trans. Knowledge Data Engrg.
, vol.7
, pp. 274-293
-
-
Thuraisingham, B.1
Ford, W.2
-
36
-
-
0031232552
-
The conceptual basis for mediation services
-
G. Wiederhold and M. Genesereth, The conceptual basis for mediation services, IEEE Expert 12 (1997), 38-47.
-
(1997)
IEEE Expert
, vol.12
, pp. 38-47
-
-
Wiederhold, G.1
Genesereth, M.2
-
37
-
-
0028720693
-
Formal query languages for secure relational databases
-
M. Winslett, K. Smith, and X. Qian, Formal query languages for secure relational databases, ACM Trans. Database Systems 19 (1994), 626-662.
-
(1994)
ACM Trans. Database Systems
, vol.19
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
-
38
-
-
0031643164
-
Data level inference detection in database systems
-
Rockport, MA, June
-
R. W. Yip and K. N. Levitt, Data level inference detection in database systems, in "Proc. of the 11th IEEE Computer Security Foundations Workshop," Rockport, MA, pp. 179-189, June 1998.
-
(1998)
Proc. of the 11th IEEE Computer Security Foundations Workshop
, pp. 179-189
-
-
Yip, R.W.1
Levitt, K.N.2
|