-
1
-
-
0003928313
-
-
Addison-Wesley, London
-
Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, London (1995)
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
2
-
-
0015489880
-
Organization and maintenance of large ordered indices
-
Bayer, R., McCreight, E.M.: Organization and maintenance of large ordered indices. Acta Informatica 1(3), 173-189 (1972)
-
(1972)
Acta Informatica
, vol.1
, Issue.3
, pp. 173-189
-
-
Bayer, R.1
McCreight, E.M.2
-
3
-
-
0003400251
-
Secure computer systems: Unified exposition and MULTICS interpretation
-
Technical Report ESD-TR-75-306, The MITRE Corporation
-
Bell, D.E., LaPadula, L.J.: Secure computer systems: Unified exposition and MULTICS interpretation. Technical Report ESD-TR-75-306, The MITRE Corporation (1975)
-
(1975)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
4
-
-
19944380112
-
Database security-concepts, approaches, and challenges
-
Bertino, E., Sandhu, R.S.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Sec. Comput. 2(1), 2-18 (2005)
-
(2005)
IEEE Trans. Dependable Sec. Comput
, vol.2
, Issue.1
, pp. 2-18
-
-
Bertino, E.1
Sandhu, R.S.2
-
5
-
-
0346236349
-
-
Art and Science. Addison-Wesley, London
-
Bishop, M.: Computer Security: Art and Science. Addison-Wesley, London (2003)
-
(2003)
Computer Security
-
-
Bishop, M.1
-
6
-
-
0034174093
-
For unknown secrecies refusal is better than lying
-
Biskup, J.: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33(1), 1-23 (2000)
-
(2000)
Data Knowl. Eng
, vol.33
, Issue.1
, pp. 1-23
-
-
Biskup, J.1
-
7
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199-222 (2001)
-
(2001)
Data Knowl. Eng
, vol.38
, Issue.2
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
8
-
-
84956985669
-
Confidentiality policies and their enforcement for controlled query evaluation
-
Gollmann, D, Karjoth, G, Waidner, M, eds, ES-ORICS 2002, Springer, Heidelberg
-
Biskup, J., Bonatti, P.A.: Confidentiality policies and their enforcement for controlled query evaluation. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ES-ORICS 2002. LNCS, vol. 2502, pp. 39-54. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2502
, pp. 39-54
-
-
Biskup, J.1
Bonatti, P.A.2
-
9
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1-2), 37-62 (2004)
-
(2004)
Ann. Math. Artif. Intell
, vol.40
, Issue.1-2
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
10
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14-27 (2004)
-
(2004)
Int. J. Inf. Sec
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
11
-
-
33745644253
-
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FolKS 2006. LNCS, 3861, pp. 43-62. Springer, Heidelberg (2006)
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FolKS 2006. LNCS, vol. 3861, pp. 43-62. Springer, Heidelberg (2006)
-
-
-
-
12
-
-
0029324246
-
Foundations of secure deductive databases
-
Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases. IEEE Trans. Knowl. Data Eng. 7(3), 406-422 (1995)
-
(1995)
IEEE Trans. Knowl. Data Eng
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.A.1
Kraus, S.2
Subrahmanian, V.S.3
-
13
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12(6), 900-919 (2000)
-
(2000)
IEEE Trans. Knowl. Data Eng
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
14
-
-
0033100756
-
Logical foundations of multilevel databases
-
Cuppens, F., Gabillon, A.: Logical foundations of multilevel databases. Data Knowl. Eng. 29(3), 259-291 (1999)
-
(1999)
Data Knowl. Eng
, vol.29
, Issue.3
, pp. 259-291
-
-
Cuppens, F.1
Gabillon, A.2
-
15
-
-
0035342199
-
Cover story management
-
Cuppens, F., Gabillon, A.: Cover story management. Data Knowl. Eng. 37(2), 177-201 (2001)
-
(2001)
Data Knowl. Eng
, vol.37
, Issue.2
, pp. 177-201
-
-
Cuppens, F.1
Gabillon, A.2
-
16
-
-
0032657567
-
Specification and enforcement of classification and inference constraints
-
IEEE Computer Society Press, Los Alamitos
-
Dawson, S., di Vimercati, S.D.C., Samarati, P.: Specification and enforcement of classification and inference constraints. In: IEEE Symposium on Security and Privacy, pp. 181-195. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 181-195
-
-
Dawson, S.1
di Vimercati, S.D.C.2
Samarati, P.3
-
17
-
-
0346861602
-
Minimal data upgrading to prevent inference and association
-
Dawson, S., di Vimercati, S.D.C., Lincoln, P., Samarati, P.: Minimal data upgrading to prevent inference and association. In: Proc. PODS 1999, pp. 114-125 (1999)
-
(1999)
Proc. PODS 1999
, pp. 114-125
-
-
Dawson, S.1
di Vimercati, S.D.C.2
Lincoln, P.3
Samarati, P.4
-
19
-
-
12244265258
-
The inference problem: A survey
-
Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations 4(2), 6-11 (2002)
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
21
-
-
0004256091
-
-
2nd edn. John Wiley & Sons, Chichester
-
Gollmann, D.: Computer Security, 2nd edn. John Wiley & Sons, Chichester (2006)
-
(2006)
Computer Security
-
-
Gollmann, D.1
-
22
-
-
0025442003
-
The SeaView security model
-
Lunt, T.F., Denning, D.D., Schell, R.R., Heckman, M., Shockley, W.R.: The SeaView security model. IEEE Trans. Software Eng. 16(6), 593-607 (1990)
-
(1990)
IEEE Trans. Software Eng
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.D.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
23
-
-
0022012611
-
A comment on the 'Basic Security Theorem' of Bell and LaPadula
-
McLean, J.: A comment on the 'Basic Security Theorem' of Bell and LaPadula. Inf. Process. Lett. 20(2), 67-70 (1985)
-
(1985)
Inf. Process. Lett
, vol.20
, Issue.2
, pp. 67-70
-
-
McLean, J.1
-
24
-
-
0023218630
-
Reasoning about security models
-
IEEE Computer Society Press, Los Alamitos
-
McLean, J.: Reasoning about security models. In: IEEE Symposium on Security and Privacy, pp. 123-131. IEEE Computer Society Press, Los Alamitos (1987)
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 123-131
-
-
McLean, J.1
-
25
-
-
0025211594
-
The specification and modeling of computer security
-
McLean, J.: The specification and modeling of computer security. IEEE Computer 23(1), 9-16 (1990)
-
(1990)
IEEE Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLean, J.1
-
26
-
-
38149001585
-
A multilevel security model for distributed object systems
-
Martella, G, Kurth, H, Montolivo, E, Bertino, E, eds, ESORICS 1996, Springer, Heidelberg
-
Nicomette, V., Deswarte, Y.: A multilevel security model for distributed object systems. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 80-98. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1146
, pp. 80-98
-
-
Nicomette, V.1
Deswarte, Y.2
-
27
-
-
0028398878
-
A taxonomy for secure object-oriented databases
-
Olivier, M.S., von Solms, S.H.: A taxonomy for secure object-oriented databases. ACM Trans. Database Syst. 19(1), 3-46 (1994)
-
(1994)
ACM Trans. Database Syst
, vol.19
, Issue.1
, pp. 3-46
-
-
Olivier, M.S.1
von Solms, S.H.2
-
28
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
ACM Press, New York
-
Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proc. ACM SIGMOD 2004, pp. 551-562. ACM Press, New York (2004)
-
(2004)
Proc. ACM SIGMOD
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
30
-
-
0027699087
-
Lattice-based access control models
-
Sandhu, R.: Lattice-based access control models. IEEE Computer 26(11), 9-19 (1993)
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.1
-
31
-
-
0020718929
-
Answering queries without revealing secrets
-
Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41-59 (1983)
-
(1983)
ACM Trans. Database Syst
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
de Jonge, W.2
van de Riet, R.P.3
-
32
-
-
84914732721
-
Access control in a relational data base management system by query modification
-
Stonebraker, M., Wong, E.: Access control in a relational data base management system by query modification. In: Proc. ACM/CSC-ER Annual Conference, pp. 180-186 (1974)
-
(1974)
Proc. ACM/CSC-ER Annual Conference
, pp. 180-186
-
-
Stonebraker, M.1
Wong, E.2
|