메뉴 건너뛰기




Volumn 4, Issue 4, 2001, Pages 321-370

A Nested Transaction Model for Multilevel Secure Database Management Systems

Author keywords

Concurrency control; Covert channels; Multilevel secure database management systems; Nested transactions; Security

Indexed keywords


EID: 84995455083     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/503339.503340     Document Type: Article
Times cited : (19)

References (40)
  • 1
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • Nov.
    • Ahn, G. and Sandhu, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4 (Nov.).
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , Issue.4
    • Ahn, G.1    Sandhu, R.2
  • 2
    • 0025028340 scopus 로고
    • Naming and grouping privileges to simplify security management in large databases
    • IEEE Press, Los Alamitos, Calif.
    • Baldwin, R. W. 1990. Naming and grouping privileges to simplify security management in large databases. In Proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif., 116-132.
    • (1990) Proceedings of the Symposium on Security and Privacy , pp. 116-132
    • Baldwin, R.W.1
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and MULTICS
    • The MITRE Corporation, Bedford, Mass., March
    • Bell, D. and La Padula. 1976. Secure computer systems: Unified exposition and MULTICS. Tech. Rep. ESD-TR-75-306, The MITRE Corporation, Bedford, Mass., March.
    • (1976) Tech. Rep. ESD-TR-75-306
    • Bell, D.1    La, P.2
  • 7
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • IEEE Press, Los Alamitos, Calif.
    • Clark, D. and Wilson, D. 1987. A comparison of commercial and military computer security policies. In proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif., 184-194.
    • (1987) proceedings of the Symposium on Security and Privacy , pp. 184-194
    • Clark, D.1    Wilson, D.2
  • 9
    • 33745638955 scopus 로고    scopus 로고
    • Final report: NIST small business innovative research (SBIR) grant: Role based access control: phase 2
    • SETA Corp., October
    • Feinstein, H. 1996. Final report: NIST small business innovative research (SBIR) grant: Role based access control: phase 2. SETA Corp., October.
    • (1996)
    • Feinstein, H.1
  • 11
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate internet
    • Ferraiolo, D., Barkley, J., and Kuhn, R. 1999. A role-based access control model and reference implementation within a corporate internet. ACM Trans. Inf. Syst. Sec. 2, 1.
    • (1999) ACM Trans. Inf. Syst. Sec. , vol.2 , Issue.1
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, R.3
  • 15
    • 0029711136 scopus 로고    scopus 로고
    • A formal model for role based access control with constraints
    • IEEE Press, Los Alamitos, Calif.
    • Giuri, L. and Iglio, P. 1996. A formal model for role based access control with constraints. In Proceedings of the Computer Security Foundations Workshop, IEEE Press, Los Alamitos, Calif., 136-145.
    • (1996) Proceedings of the Computer Security Foundations Workshop , pp. 136-145
    • Giuri, L.1    Iglio, P.2
  • 20
    • 0000206310 scopus 로고    scopus 로고
    • Security models for web-based applications
    • Feb.
    • Joshi, J. B. D., Aref, W. G., Ghafoor, A., and Spafford, E. H. 2001a. Security models for web-based applications. Commun. ACM, 44, 2, Feb. 38-44.
    • (2001) Commun. ACM , vol.44 , Issue.2 , pp. 38-44
    • Joshi, J.B.D.1    Aref, W.G.2    Ghafoor, A.3    Spafford, E.H.4
  • 21
    • 0035251598 scopus 로고    scopus 로고
    • Digital government security infrastructure design challenges
    • Feb.
    • Joshi, J., Ghafoor, A., Aref, W. G., and Spafford, E. H. 2001b. Digital government security infrastructure design challenges. IEEE Comput. 33, 2, Feb. 66-72.
    • (2001) IEEE Comput. , vol.33 , Issue.2 , pp. 66-72
    • Joshi, J.1    Ghafoor, A.2    Aref, W.G.3    Spafford, E.H.4
  • 23
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion as a means of implementing separation of duty requirements in role based access control systems
    • Kuhn, R. 1997. Mutual exclusion as a means of implementing separation of duty requirements in role based access control systems. In Proceedings of the Second ACM Workshop on Role Based Access Control, 23-30.
    • (1997) Proceedings of the Second ACM Workshop on Role Based Access Control , pp. 23-30
    • Kuhn, R.1
  • 27
    • 0010573970 scopus 로고
    • Access rights administration in role-based security systems
    • J. Biskup, M. Morgenstern, and C. E. Landwehr, Eds., North-Holland
    • Nyanchama, M. and Osborn, S. 1994. Access rights administration in role-based security systems. In Database Security, VIII: Status and Prospects, J. Biskup, M. Morgenstern, and C. E. Landwehr, Eds., North-Holland, 37-56.
    • (1994) Database Security, VIII: Status and Prospects , pp. 37-56
    • Nyanchama, M.1    Osborn, S.2
  • 29
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Osborn, S., Sandhu, R., and Munawer, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Sec. 3, 2.
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , pp. 2
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 30
    • 0033312487 scopus 로고    scopus 로고
    • Role-based administration of user-role assignment: the URA97 model and its oracle implementation
    • Sandhu, R. and Bhamidipati, V. 1997. Role-based administration of user-role assignment: the URA97 model and its oracle implementation. J. Compu. Sec. 7.
    • (1997) J. Compu. Sec. , pp. 7
    • Sandhu, R.1    Bhamidipati, V.2
  • 32
    • 19344364618 scopus 로고    scopus 로고
    • Role-based access control
    • M. Zelkowitz Eds. Academic
    • Sandhu, R. 1998b. Role-based access control. In Advances in Computers, vol. 46, M. Zelkowitz Eds. Academic, 237-286.
    • (1998) Advances in Computers , vol.46 , pp. 237-286
    • Sandhu, R.1
  • 33
    • 0024125647 scopus 로고
    • Transaction control expressions for separation of duties
    • (Orlando, Fla.). IEEE Computer Society Press, Dec. Los Alamitos, Calif.
    • Sandhu, R. 1988. Transaction control expressions for separation of duties. In Proceedings of the Fourth Aerospace Computer Security Applications Conference (Orlando, Fla.). IEEE Computer Society Press, Dec. Los Alamitos, Calif., 282-286.
    • (1988) Proceedings of the Fourth Aerospace Computer Security Applications Conference , pp. 282-286
    • Sandhu, R.1
  • 34
    • 0001549660 scopus 로고    scopus 로고
    • The ARBAC97 model for role-based administration of roles
    • (Feb.)
    • Sandhu, R., Bhamidipati, V., and Munawer, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Sys. Sec. 2, 1, (Feb.), 105-135.
    • (1999) ACM Trans. Inf. Sys. Sec. , vol.2 , pp. 105-135
    • Sandhu, R.1    Bhamidipati, V.2    Munawer, Q.3
  • 39
    • 1242282117 scopus 로고
    • Role-based application design and enforcement
    • S. Jajodia and C. E. Landwehr Eds. North-Holland
    • Thomsen, D. J. 1991. Role-based application design and enforcement. In Database Security, IV: Status and Prospects, S. Jajodia and C. E. Landwehr, Eds., North-Holland, 151-168.
    • (1991) Database Security, IV: Status and Prospects , pp. 151-168
    • Thomsen, D.J.1
  • 40
    • 77956772659 scopus 로고
    • Requirements capabilities and functionalities of user-role based security for an object-oriented design model
    • S. Jajodia and C. E. Landwehr Eds. North-Holland
    • Ting, T. C., Demurjian, S. A., and Hu, M. Y. 1992. Requirements capabilities and functionalities of user-role based security for an object-oriented design model. In Database Security, IV: Status and Prospects, S. Jajodia and C. E. Landwehr, Eds., North-Holland, 275-296.
    • (1992) Database Security, IV: Status and Prospects , pp. 275-296
    • Ting, T.C.1    Demurjian, S.A.2    Hu, M.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.