메뉴 건너뛰기




Volumn , Issue , 2011, Pages 416-422

Diesel: Applying privilege separation to database access

Author keywords

Data separation; Privilege separation

Indexed keywords

CODES (SYMBOLS); QUERY LANGUAGES; QUERY PROCESSING;

EID: 79955984052     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1966913.1966971     Document Type: Conference Paper
Times cited : (20)

References (29)
  • 3
    • 84894039463 scopus 로고    scopus 로고
    • Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications
    • Montreal, Canada, August
    • M. Dalton, C. Kozyrakis, and N. Zeldovich. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications. In Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, August 2009.
    • (2009) Proceedings of the 18th USENIX Security Symposium
    • Dalton, M.1    Kozyrakis, C.2    Zeldovich, N.3
  • 4
    • 84894088425 scopus 로고    scopus 로고
    • Toward automated detection of logic vulnerabilities in web applications
    • V. Felmetsger, L. Cavedon, C. Kruegel, and G. Vigna. Toward Automated Detection of Logic Vulnerabilities in Web Applications. In USENIX Security, 2010.
    • (2010) USENIX Security
    • Felmetsger, V.1    Cavedon, L.2    Kruegel, C.3    Vigna, G.4
  • 7
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • P. P. Griffiths and B. W. Wade. An authorization mechanism for a relational database system. ACM Trans. Database Syst., 1(3):242-255, 1976.
    • (1976) ACM Trans. Database Syst. , vol.1 , Issue.3 , pp. 242-255
    • Griffiths, P.P.1    Wade, B.W.2
  • 11
    • 34250649785 scopus 로고    scopus 로고
    • Redundancy and information leakage in fine-grained access control
    • DOI 10.1145/1142473.1142489, SIGMOD 2006 - Proceedings of the ACM SIGMOD International Conference on Management of Data
    • G. Kabra, R. Ramamurthy, and S. Sudarshan. Redundancy and information leakage in fine-grained access control. In SIGMOD '06: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pages 133-144, New York, NY, USA, 2006. ACM. (Pubitemid 46946508)
    • (2006) Proceedings of the ACM SIGMOD International Conference on Management of Data , pp. 133-144
    • Kabra, G.1    Ramamurthy, R.2    Sudarshan, S.3
  • 14
    • 0024752925 scopus 로고
    • Security in a secure capability-based system
    • C. R. Landau. Security in a secure capability-based system. SIGOPS Oper. Syst. Rev., 23(4):2-4, 1989.
    • (1989) SIGOPS Oper. Syst. Rev. , vol.23 , Issue.4 , pp. 2-4
    • Landau, C.R.1
  • 20
    • 84881361956 scopus 로고    scopus 로고
    • MySQL Proxy. http://forge.mysql.com/wiki/MySQL-Proxy.
    • MySQL Proxy.
  • 26
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 27
    • 0001421170 scopus 로고    scopus 로고
    • EROS: A fast capability system
    • J. S. Shapiro, J. M. Smith, and D. J. Farber. EROS: a fast capability system. In SOSP '99: Proceedings of the seventeenth ACM Symposium on Operating Systems Principles, pages 170-185, New York, NY, USA, 1999. ACM. (Pubitemid 129548355)
    • (1999) Operating Systems Review (ACM) , vol.33 , Issue.5 , pp. 170-185
    • Shapiro, J.S.1    Smith, J.M.2    Farber, D.J.3
  • 28
    • 85175132293 scopus 로고    scopus 로고
    • Sun Microsystems, Inc. Connection pooling, 2008.http://java.sun.com/ developer/onlineTraining/Programming/JDCBook/conpool.html#pool.
    • (2008) Connection Pooling


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.