-
4
-
-
0015331056
-
On the implementation of security measures in information systems
-
Conway, R.W., Maxwell, W.L. and Morgan, H.L.: On the implementation of security measures in information systems. Communications of the ACM 15(4) (1972) 211-220
-
(1972)
Communications of the ACM
, vol.15
, Issue.4
, pp. 211-220
-
-
Conway, R.W.1
Maxwell, W.L.2
Morgan, H.L.3
-
5
-
-
84942812332
-
Protection - Principles and practice
-
AFIPS 417-429, Montrale, N.J.
-
Graham, G.S. and Denning, P.J.: Protection - Principles and practice. Proc. Spring Jt. Computer Conf., Vol. 40, AFIPS 417-429, Montrale, N.J. (1972)
-
(1972)
Proc. Spring Jt. Computer Conf.
, vol.40
-
-
Graham, G.S.1
Denning, P.J.2
-
6
-
-
0028543071
-
A new dynamic access control scheme based on subjectobject-list
-
Hwang, M.S. and Yang, W.P.: A new dynamic access control scheme based on subjectobject-list. Data and Knowledge Engineering 14(1) (1994) 45-56
-
(1994)
Data and Knowledge Engineering
, vol.14
, Issue.1
, pp. 45-56
-
-
Hwang, M.S.1
Yang, W.P.2
-
8
-
-
0025442003
-
The SeaView security model
-
Lunt, T.F., Denning, D.E., Schell, R.R., Heckman, M. and Shockley, W.R.: The SeaView security model. IEEE Trans, on Software Engineering, SE-16(6) (1990) 593-607
-
(1990)
IEEE Trans, on Software Engineering
, vol.SE-16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
9
-
-
0025447566
-
Design of LDV: A multilevel secure relational database management system
-
Stachour, P.D. and Thuraisingham, B.: Design of LDV: A multilevel secure relational database management system, IEEE Trans, on Knowledge and Data Engineering 2(2) (1990) 190-209
-
(1990)
IEEE Trans, on Knowledge and Data Engineering
, vol.2
, Issue.2
, pp. 190-209
-
-
Stachour, P.D.1
Thuraisingham, B.2
-
10
-
-
0003508568
-
-
FIPS, NBS
-
National Bureau of Standards. Data Encryption Standard. FIPS, NBS (1977)
-
(1977)
Data Encryption Standard
-
-
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R.L., Shamir, A. and Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2) (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
12
-
-
0024012695
-
The data encryption standard: Past and future
-
Smid, M.E. and Branstad, D.K.: The data encryption standard: past and future. Proc. IEEE 76(5) (1988) 550-559
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 550-559
-
-
Smid, M.E.1
Branstad, D.K.2
-
13
-
-
0019573099
-
A Database Encryption System with Subkeys
-
Davida, G.I., Wells, D.L., and Kam, J.B.: A Database Encryption System with Subkeys. ACM Trans. Database Syst. 6 (1981) 312-328
-
(1981)
ACM Trans. Database Syst.
, vol.6
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
15
-
-
79951510303
-
Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs
-
Washington
-
Damiani, E., De Capitani diVimercati, S., Jajodia, S., Paraboschi, S. and Samarati, P.: Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs. CCS'03, Washington (2003) 27-31
-
(2003)
CCS'03
, pp. 27-31
-
-
Damiani, E.1
De Capitani Divimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
17
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin, USA
-
Hacigiimiis, H., Iyer, B., Li, C., and Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, Wisconsin, USA (2002)
-
(2002)
Proc. of the ACM SIGMOD'2002
-
-
Hacigiimiis, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
18
-
-
26444538232
-
A Framework for Efficient Storage Security in RDBMS
-
E. Bertino et al. (Eds.)
-
Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G. and Wu, Y.: A Framework for Efficient Storage Security in RDBMS. E. Bertino et al. (Eds.): EDBT 2004, LNCS 2992 (2004) 147-164
-
(2004)
EDBT 2004, LNCS
, vol.2992
, pp. 147-164
-
-
Iyer, B.1
Mehrotra, S.2
Mykletun, E.3
Tsudik, G.4
Wu, Y.5
-
21
-
-
84976748588
-
On the Encipherment of Search Trees and Random Access Files
-
Bayer, R. and Metzger, J.K.-On the Encipherment of Search Trees and Random Access Files. ACM Trans Database Systems, Vol. 1 (1976) 37-52
-
(1976)
ACM Trans Database Systems
, vol.1
, pp. 37-52
-
-
Bayer, R.1
Metzger, J.K.2
-
23
-
-
0029478393
-
A two-phase encryption scheme for enhancing database security
-
Hwang, M.S. and Yang, W.P.: A two-phase encryption scheme for enhancing database security. J. Systems and Software 31(12) (1995) 257-265
-
(1995)
J. Systems and Software
, vol.31
, Issue.12
, pp. 257-265
-
-
Hwang, M.S.1
Yang, W.P.2
|