-
1
-
-
0003928313
-
-
Addison-Wesley, Reading
-
Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
2
-
-
49049100147
-
Secure computer systems: A mathematical model
-
reprint of MITRE Corporation
-
Bell, D.E., LaPadula, L.J.: Secure computer systems: A mathematical model, volume II. Journal of Computer Security 4(2/3), 229-263 (1996); reprint of MITRE Corporation (1974)
-
(1974)
Journal of Computer Security
, vol.2-4
, Issue.2-3
, pp. 229-263
-
-
Bell, D.E.1
LaPadula, L.J.2
-
3
-
-
0033725849
-
A logic-based approach for enforcing access control
-
Bertino, E., Buccafurri, F., Ferrari, E., Rullo, P.: A logic-based approach for enforcing access control. Journal of Computer Security 8(2/3) (2000)
-
(2000)
Journal of Computer Security
, vol.8
, Issue.2-3
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
5
-
-
77951549976
-
Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution
-
Kikuchi, S., Sachdeva, S., Bhalla, S. (eds.) DNIS 2010. Springer, Heidelberg
-
Biskup, J.: Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution. In: Kikuchi, S., Sachdeva, S., Bhalla, S. (eds.) DNIS 2010. LNCS, vol. 5999, pp. 80-106. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5999
, pp. 80-106
-
-
Biskup, J.1
-
6
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14-27 (2004)
-
(2004)
Int. J. Inf. Sec.
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
7
-
-
46649105922
-
Protection of database security via collaborative inference detection
-
Chen, Y., Chu, W.W.: Protection of database security via collaborative inference detection. IEEE Trans. Knowl. Data Eng. 20(8), 1013-1027 (2008)
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.8
, pp. 1013-1027
-
-
Chen, Y.1
Chu, W.W.2
-
8
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2), 214-260 (2001)
-
(2001)
ACM Trans. Database Syst.
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
9
-
-
78049404569
-
A theory of runtime enforcement, with results
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
-
Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 87- 100. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 87-100
-
-
Ligatti, J.1
Reddy, S.2
-
10
-
-
84881225236
-
Enforceable security policies
-
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30-50 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
11
-
-
0020718929
-
Answering queries without revealing secrets
-
Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41-59 (1983)
-
(1983)
ACM Trans. Database Syst.
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
De Jonge, W.2
Van De Riet, R.P.3
|