메뉴 건너뛰기




Volumn 3084, Issue , 2004, Pages 234-247

Secure databases: An analysis of Clark-Wilson model in a database environment

Author keywords

Access control; Data integrity; Databases; Development methods; Security models

Indexed keywords

ACCESS CONTROL; INFORMATION SYSTEMS; MOBILE SECURITY; NETWORK SECURITY;

EID: 35048864767     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-25975-6_18     Document Type: Article
Times cited : (12)

References (23)
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • MITRE Corporation
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report MTR 2547 v2, MITRE Corporation, 1973.
    • (1973) Technical Report MTR 2547 V2
    • Bell, D.E.1    Lapadula, L.J.2
  • 4
    • 0003400255 scopus 로고
    • Integrity constraints for secure computer systems
    • Hanscom AFB
    • K. J. Biba. Integrity constraints for secure computer systems. Technical Report EST TR-76-372, Hanscom AFB, 1977.
    • (1977) Technical Report EST TR-76-372
    • Biba, K.J.1
  • 6
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland, April
    • D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium on Security and Privacy, pages 184-194, Oakland, April 1987.
    • (1987) IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 8
    • 35048817238 scopus 로고    scopus 로고
    • A logical formalization of integrity policies for database management systems
    • S. Jajodia, W. List, G. W. McGregor, and L. Strous, editors, Kluwer
    • F. Cuppens and G. Saurel. A logical formalization of integrity policies for database management systems. In S. Jajodia, W. List, G. W. McGregor, and L. Strous, editors, Integrity and Internal Control in Information Systems. Kluwer, 1998.
    • (1998) Integrity and Internal Control in Information Systems
    • Cuppens, F.1    Saurel, G.2
  • 9
    • 0003969633 scopus 로고
    • TCSEC: Trusted computer system evaluation criteria
    • 5200.28-STD, U.S. Department of Defense
    • DOD. TCSEC: Trusted computer system evaluation criteria. Technical Report 5200.28-STD, U.S. Department of Defense, 1985.
    • (1985) Technical Report
  • 11
    • 0030680628 scopus 로고    scopus 로고
    • The specification and implementation of "commercial" security requirements including dynamic segregation of duties
    • ACM Press, April
    • S. N. Foley. The specification and implementation of " commercial" security requirements including dynamic segregation of duties. In 4th ACM Conf. on Computer and Communications Security, pages 125-134. ACM Press, April 1997.
    • (1997) 4th ACM Conf. on Computer and Communications Security , pp. 125-134
    • Foley, S.N.1
  • 13
    • 35048824100 scopus 로고    scopus 로고
    • International standard - SQL
    • ISO/IEC 9075-1
    • ISO. International standard - SQL. Technical report, ISO/IEC 9075-1, 1999.
    • (1999) Technical Report
  • 14
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UML
    • FASE 2001, Genova, Italy, Springer Verlag, April
    • J. Jürjens. Towards development of secure systems using UML. In FASE 2001, Genova, Italy, volume 2029 of LNCS, pages 187-201. Springer Verlag, April 2001.
    • (2001) LNCS , vol.2029 , pp. 187-201
    • Jürjens, J.1
  • 15
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • UML 2002. Dresden, Germany, Springer Verlag, Sept-Oct
    • J. Jürjens. UMLsec: Extending UML for secure systems development. In UML 2002. Dresden, Germany, volume 2460 of LNCS, pages 412-425. Springer Verlag, Sept-Oct 2002.
    • (2002) LNCS , vol.2460 , pp. 412-425
    • Jürjens, J.1
  • 16
    • 0023859517 scopus 로고
    • Using mandatory integrity to enforce "commercial" security
    • Oakland, April
    • T. M. P. Lee. Using mandatory integrity to enforce "commercial" security. In IEEE Symposium on Security and Privacy, pages 140-146, Oakland, April 1988.
    • (1988) IEEE Symposium on Security and Privacy , pp. 140-146
    • Lee, T.M.P.1
  • 17
    • 0020253786 scopus 로고
    • Non-discrentionary controls for commercial applications
    • Oakland, May
    • S. B. Lipner. Non-discrentionary controls for commercial applications. In IEEE Symposium on Security and Privacy, pages 2-10, Oakland, May 1982.
    • (1982) IEEE Symposium on Security and Privacy , pp. 2-10
    • Lipner, S.B.1
  • 18
    • 35048852341 scopus 로고    scopus 로고
    • Microsoft Corporation
    • Microsoft. SQL server, version 7.0. Microsoft Corporation, 1999.
    • (1999) SQL Server, Version 7.0
  • 22
    • 84931824468 scopus 로고    scopus 로고
    • A rigorous metamodel for UML static conceptual modelling of information systems
    • CAiSE 2001, Interlaken, Switzerland, Springer Verlag, June
    • F. Polack and R. Laleau. A rigorous metamodel for UML static conceptual modelling of information systems. In CAiSE 2001, Interlaken, Switzerland, volume 2068 of LNCS, pages 402-416. Springer Verlag, June 2001.
    • (2001) LNCS , vol.2068 , pp. 402-416
    • Polack, F.1    Laleau, R.2
  • 23
    • 6444224063 scopus 로고
    • Implementing the Clark/Wilson integrity policy using current technology
    • Baltimore, October
    • W. R. Shockley. Implementing the Clark/Wilson integrity policy using current technology. In 11th National Computer Security Conference, pages 29-37, Baltimore, October 1988.
    • (1988) 11th National Computer Security Conference , pp. 29-37
    • Shockley, W.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.