메뉴 건너뛰기




Volumn 303 LNCS, Issue , 1988, Pages 155-169

Views and security in distributed database management systems

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SYSTEMS; SECURITY OF DATA;

EID: 85034775239     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-19074-0_52     Document Type: Conference Paper
Times cited : (16)

References (37)
  • 1
    • 84976770519 scopus 로고
    • System R: A Relational Approach to Database Management
    • June
    • Astrahan M.M., et al., “System R: A Relational Approach to Database Management”, ACM Trans. on Database Systems, 1:2 (June, 1976) pp.97–137.
    • (1976) ACM Trans. on Database Systems , vol.1 , Issue.2 , pp. 97-137
    • Astrahan, M.M.1
  • 5
    • 84920378125 scopus 로고    scopus 로고
    • Using Views in a Multilevel Secure Database Management System
    • April, 1983
    • Claybrook H., “Using Views in a Multilevel Secure Database Management System”, Proc. 1983 IEEE Symposium on Security and Privacy (April, 1983) pp.4–17.
    • Proc. 1983 IEEE Symposium on Security and Privacy , pp. 4-17
    • Claybrook, H.1
  • 6
    • 85034775800 scopus 로고
    • Special Issue on Data Security in Computer Networks
    • February
    • Special Issue on Data Security in Computer Networks, IEEE Computer 16:2 (February 1983).
    • (1983) IEEE Computer , vol.16 , pp. 2
  • 10
    • 0020779363 scopus 로고
    • Inference Controls for Statistical Databases
    • July
    • Denning D.E., Schlorer J., “Inference Controls for Statistical Databases”, IEEE Computer 16:7 (July, 1983) pp.69–81.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 69-81
    • Denning, D.E.1    Schlorer, J.2
  • 12
    • 0017517624 scopus 로고
    • A Lattice Model of Secure Information Flow
    • July
    • Denning D.E., “A Lattice Model of Secure Information Flow”, Communications of the ACM 20:7 (July, 1977) pp.504–513.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1
  • 13
    • 0017721606 scopus 로고
    • A Kernel Design for a Secure Data Base Management System
    • Tokyo, October
    • Downs D., and Popek G.J., “A Kernel Design for a Secure Data Base Management System”, Proc. 3rd Int. Conf. on Very Large Data Bases (Tokyo, October, 1977) pp.507–514.
    • (1977) Proc. 3Rd Int. Conf. on Very Large Data Bases , pp. 507-514
    • Downs, D.1    Popek, G.J.2
  • 15
    • 85072542009 scopus 로고
    • A Security Retrofit of VM/370
    • AFIPS Press
    • Gold B.D. et al., “A Security Retrofit of VM/370”, AFIPS Conf. Proc. 48, 1979 NCC, AFIPS Press (1979) pp.335–344.
    • (1979) AFIPS Conf. Proc. 48, 1979 NCC , pp. 335-344
    • Gold, B.D.1
  • 17
    • 85034782957 scopus 로고    scopus 로고
    • R*: A Research Project on a Distributed Database System
    • December, 1982
    • Haas L.M., et al., “R*: A Research Project on a Distributed Database System”, Database Engineering Bulletin (IEEE Computer Society) 5:4 (December, 1982).
    • Database Engineering Bulletin (IEEE Computer Society) , vol.5 , Issue.4
    • Haas, L.M.1
  • 20
    • 84976769948 scopus 로고
    • Computation and Communication in R*: A Distributed Database Manager
    • (February) 1984. Also in Proc. 9th ACM Symposium on Operating Systems Principles (Bretton Woods, October
    • Lindsay B.G., Haas L.M., Mohan C., Wilms P.F., Yost R.A., “Computation and Communication in R*: A Distributed Database Manager”, ACM Trans. on Computer Systems 2:1 (February) 1984. Also in Proc. 9th ACM Symposium on Operating Systems Principles (Bretton Woods, October, 1983)
    • (1983) ACM Trans. on Computer Systems , vol.2 , Issue.1
    • Lindsay, B.G.1    Haas, L.M.2    Mohan, C.3    Wilms, P.F.4    Yost, R.A.5
  • 23
    • 0018320025 scopus 로고
    • KSOS-The Design of a Secure Operating System
    • AFIPS Press
    • McCauley E.J., and Drongowski P.J., “KSOS-The Design of a Secure Operating System”, in AFIPS Conf. Proc. 48, 1979 NCC, AFIPS Press (1979) pp.345–351.
    • (1979) AFIPS Conf. Proc. 48, 1979 NCC , pp. 345-351
    • McCauley, E.J.1    Drongowski, P.J.2
  • 24
    • 0021308587 scopus 로고
    • Security Considerations for Personal Computers
    • Murray W.H., “Security Considerations for Personal Computers”, IBM Systems Journal 23:3 1984.
    • (1984) IBM Systems Journal , vol.23 , pp. 3
    • Murray, W.H.1
  • 25
    • 0018048246 scopus 로고    scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • December, 1978
    • Needham R.M., and Schroeder M.D., “Using Encryption for Authentication in Large Networks of Computers”, Communications of the ACM 20:12 (December, 1978).
    • Communications of the ACM , vol.20 , Issue.12
    • Needham, R.M.1    Schroeder, M.D.2
  • 27
    • 0021425586 scopus 로고
    • Can Computer Crime be Stopped?
    • May
    • Perry T.S, and Wallich P., “Can Computer Crime be Stopped?”, IEEE Spectrum 21:5 (May, 1984) pp.34–45.
    • (1984) IEEE Spectrum , vol.21 , Issue.5 , pp. 34-45
    • Perry, T.S.1    Wallich, P.2
  • 28
    • 0018322448 scopus 로고
    • UCLA Secure UNIX
    • 1979 NCC, AFIPS Press
    • Popek, G. et al., “UCLA Secure UNIX”, in AFIPS Conf. Proc. 48, 1979 NCC, AFIPS Press (1979) pp.355–364.
    • (1979) AFIPS Conf. Proc. 48 , pp. 355-364
    • Popek, G.1
  • 29
    • 0020779556 scopus 로고    scopus 로고
    • A Distributed Secure System
    • July, 1983
    • Rushby J., and Randell B., “A Distributed Secure System”, IEEE Computer 16:7 (July, 1983) pp.55–67.
    • IEEE Computer , vol.16 , Issue.7 , pp. 55-67
    • Rushby, J.1    Randell, B.2
  • 30
    • 85034760862 scopus 로고
    • “SQL/Data System: Application Programming”, SH24-5018
    • IBM Corporation, “SQL/Data System: Application Programming”, SH24-5018 (1981).
    • (1981)
  • 32
    • 0020821853 scopus 로고
    • MULTISAFE — A Modular Multiprocessing Approach to Secure Database Management
    • September
    • Trueblood R.P, Hartson H.R., and Martin J.J., “MULTISAFE — A Modular Multiprocessing Approach to Secure Database Management”, ACM Trans. on Database Systems 8:3 (September, 1983) pp.382–409.
    • (1983) ACM Trans. on Database Systems , vol.8 , Issue.3 , pp. 382-409
    • Trueblood, R.P.1    Hartson, H.R.2    Martin, J.J.3
  • 33
    • 0020762394 scopus 로고    scopus 로고
    • Security Mechanisms in High-Level Network Protocols
    • June, 1983
    • Voydock V.L., and Kent S.T., “Security Mechanisms in High-Level Network Protocols”, ACM Computing Surveys 15:2 (June, 1983) pp.135–171.
    • ACM Computing Surveys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.L.1    Kent, S.T.2
  • 34
    • 0018983212 scopus 로고
    • Specification and Verification of the UCLA Unix Security Kernel
    • February
    • Walker B.J., Kemmerer R.A., and Popek G.J., “Specification and Verification of the UCLA Unix Security Kernel”, Communications of the ACM 23:2 (February, 1980) pp.118–131.
    • (1980) Communications of the ACM , vol.23 , Issue.2 , pp. 118-131
    • Walker, B.J.1    Kemmerer, R.A.2    Popek, G.J.3
  • 36
    • 0020275745 scopus 로고
    • A Database Authorization Mechanism Supporting Individual and Group Authorization
    • (van de Riet and Litwin, Eds.), North-Holland Publishing Company
    • Wilms P.F. “A Database Authorization Mechanism Supporting Individual and Group Authorization”, in Distributed Data Sharing Systems, (van de Riet and Litwin, Eds.), North-Holland Publishing Company (1982).
    • (1982) Distributed Data Sharing Systems
    • Wilms, P.F.1
  • 37
    • 0019009078 scopus 로고    scopus 로고
    • OSI Reference Model — The ISO Model of Architecture for Open System Interconnection
    • April, 1980
    • Zimmermann H., “OSI Reference Model — The ISO Model of Architecture for Open System Interconnection”, IEEE Trans. on Communications 28:4 (April, 1980) pp.425–432.
    • IEEE Trans. on Communications , vol.28 , Issue.4 , pp. 425-432
    • Zimmermann, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.