메뉴 건너뛰기




Volumn 2736, Issue , 2003, Pages 886-895

Designing secure databases for OLS

Author keywords

[No Author keywords available]

Indexed keywords

DATA HANDLING; DATABASE SYSTEMS; DESIGN;

EID: 35048812519     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45227-0_86     Document Type: Article
Times cited : (5)

References (21)
  • 1
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon, G. & Backhouse, J. (2000). Information system security management in the new millennium. Communications of the ACM,. 43, 7, 125-128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 2
    • 16344386685 scopus 로고
    • What is there to worry about? An introduction to the computer security problem
    • Abrams, M., Jajodia, S. & Podell (Eds.), (Chapter 1). California, IEEE Computer Society
    • Brinkley, D. & Schell, R. (1995). What is there to worry about? An introduction to the computer security problem. In Abrams, M., Jajodia, S. & Podell (Eds.), Information security, an integrated collection of essays (Chapter 1). California, IEEE Computer Society.
    • (1995) Information Security, an Integrated Collection of Essays
    • Brinkley, D.1    Schell, R.2
  • 4
  • 7
    • 0036149234 scopus 로고    scopus 로고
    • Correctness by construction developing a commercial secure system
    • Hall, A. & Chapman, R. (2002). Correctness by construction developing a commercial secure system. IEEE Software, 19, 1, 18-25.
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 18-25
    • Hall, A.1    Chapman, R.2
  • 10
    • 0030195327 scopus 로고    scopus 로고
    • MOMT: A multilevel object modeling technique for designing secure database applications
    • Marks, D., Sell, P. & Thuraisingham, B. (1996). MOMT: A multilevel object modeling technique for designing secure database applications. Journal of Object-Oriented Programming. 9, 4, 22-29.
    • (1996) Journal of Object-Oriented Programming , vol.9 , Issue.4 , pp. 22-29
    • Marks, D.1    Sell, P.2    Thuraisingham, B.3
  • 11
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • Jézéquel, J., Hussmann, H. & Cook, S. (Eds.), Germany, Springer
    • Jürjens, J. (2002). UMLsec: Extending UML for secure systems development. In Jézéquel, J., Hussmann, H. & Cook, S. (Eds.), UML 2002 - The Unified Modeling Language, Model engineering, concepts and tools (pp. 412-425). Germany, Springer.
    • (2002) UML 2002 - The Unified Modeling Language, Model Engineering, Concepts and Tools , pp. 412-425
    • Jürjens, J.1
  • 15
    • 14244256759 scopus 로고    scopus 로고
    • Oracle label security
    • Retrieved July 1, 2002
    • Levinger, J. (2002). Oracle label security. Administrator's guide. Release 2 (9.2). Retrieved July 1, 2002, from http://www.csis.gvsu.edu/GeneralInfo/Oracle/network.920/a96578.pdf.
    • (2002) Administrator's Guide. Release 2 (9.2)
    • Levinger, J.1
  • 19
    • 0006973722 scopus 로고    scopus 로고
    • Whatever happened to Object-Oriented Databases?
    • August
    • Leavitt, N. (2000). Whatever happened to Object-Oriented Databases?. Industry Trends, IEEE Computer Society, August, 16-19.
    • (2000) Industry Trends, IEEE Computer Society , pp. 16-19
    • Leavitt, N.1
  • 20
    • 3042537739 scopus 로고    scopus 로고
    • Temporal OCL: Meeting specification demands for business components
    • Siau, K. & Halpin, T. (Eds.), (Chapter 10). Hersey, PA., Idea Group Publishing
    • Conrad, C. & Turowski, K. (2001). Temporal OCL: Meeting specification demands for business components. In Siau, K. & Halpin, T. (Eds.), Unified modeling language: Systems analysis, design and development issues (Chapter 10). Hersey, PA., Idea Group Publishing.
    • (2001) Unified Modeling Language: Systems Analysis, Design and Development Issues
    • Conrad, C.1    Turowski, K.2
  • 21
    • 27644567989 scopus 로고    scopus 로고
    • Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection
    • IEEE Computer Society
    • Toval, A., Olmos, A & Piattini, M. (2002). Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection. IEEE Joint International Requirements Engineering Conference (RE'02). IEEE Computer Society, 95-103.
    • (2002) IEEE Joint International Requirements Engineering Conference (RE'02) , pp. 95-103
    • Toval, A.1    Olmos, A.2    Piattini, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.