-
1
-
-
84976770519
-
System R: A Relational Approach to Database Management
-
June
-
Astrahan M.M., et al., “System R: A Relational Approach to Database Management”, ACM Trans. on Database Systems, 1:2 (June, 1976) pp.97–137.
-
(1976)
ACM Trans. on Database Systems
, vol.1
, Issue.2
, pp. 97-137
-
-
Astrahan, M.M.1
-
3
-
-
0016655620
-
View, Authorization and Locking in Database System
-
Chamberlin D.D., Gray J.N., and Traiger I.L., View, Authorization and Locking in Database System”, Proc. AFIPS NCC 44 (1975).
-
(1975)
Proc. AFIPS NCC
, vol.44
-
-
Chamberlin, D.D.1
Gray, J.N.2
Traiger, I.L.3
-
6
-
-
85034775800
-
Special Issue on Data Security in Computer Networks
-
February
-
Special Issue on Data Security in Computer Networks, IEEE Computer 16:2 (February 1983).
-
(1983)
IEEE Computer
, vol.16
, pp. 2
-
-
-
8
-
-
84909851650
-
Views for Multilevel Database Security
-
Oakland (CA), April
-
Denning D.E., Akl S.G., Morgenstern M., Neumann P.G., Schell R.R., Heckman M. “Views for Multilevel Database Security”, Proc. 1986 IEEE Symposium on Security and Privacy (Oakland (CA), April, 1986) pp.156–172.
-
(1986)
Proc. 1986 IEEE Symposium on Security and Privacy
, pp. 156-172
-
-
Denning, D.E.1
Akl, S.G.2
Morgenstern, M.3
Neumann, P.G.4
Schell, R.R.5
Heckman, M.6
-
9
-
-
85034749699
-
Database Security: Access Controls
-
(B.Randell, ed.), (Newcastle upon Tyne, September
-
Denning D.E., “Database Security: Access Controls” in Security and Privacy, Proc. of the Joint IBM/Newcastle upon Tyne Seminar (B.Randell, ed.), (Newcastle upon Tyne, September, 1984) pp.29–31.
-
(1984)
Security and Privacy, Proc. of the Joint Ibm/Newcastle upon Tyne Seminar
, pp. 29-31
-
-
Denning, D.E.1
-
10
-
-
0020779363
-
Inference Controls for Statistical Databases
-
July
-
Denning D.E., Schlorer J., “Inference Controls for Statistical Databases”, IEEE Computer 16:7 (July, 1983) pp.69–81.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 69-81
-
-
Denning, D.E.1
Schlorer, J.2
-
12
-
-
0017517624
-
A Lattice Model of Secure Information Flow
-
July
-
Denning D.E., “A Lattice Model of Secure Information Flow”, Communications of the ACM 20:7 (July, 1977) pp.504–513.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
-
13
-
-
0017721606
-
A Kernel Design for a Secure Data Base Management System
-
Tokyo, October
-
Downs D., and Popek G.J., “A Kernel Design for a Secure Data Base Management System”, Proc. 3rd Int. Conf. on Very Large Data Bases (Tokyo, October, 1977) pp.507–514.
-
(1977)
Proc. 3Rd Int. Conf. on Very Large Data Bases
, pp. 507-514
-
-
Downs, D.1
Popek, G.J.2
-
15
-
-
85072542009
-
A Security Retrofit of VM/370
-
AFIPS Press
-
Gold B.D. et al., “A Security Retrofit of VM/370”, AFIPS Conf. Proc. 48, 1979 NCC, AFIPS Press (1979) pp.335–344.
-
(1979)
AFIPS Conf. Proc. 48, 1979 NCC
, pp. 335-344
-
-
Gold, B.D.1
-
17
-
-
85034782957
-
R*: A Research Project on a Distributed Database System
-
December, 1982
-
Haas L.M., et al., “R*: A Research Project on a Distributed Database System”, Database Engineering Bulletin (IEEE Computer Society) 5:4 (December, 1982).
-
Database Engineering Bulletin (IEEE Computer Society)
, vol.5
, Issue.4
-
-
Haas, L.M.1
-
18
-
-
9744272072
-
-
Prentice-Hall, Inc., Englewood Cliffs, NJ
-
Krauss L.I., and MacGahan A., “Computer Fraud and Countermeasures”, Prentice-Hall, Inc., Englewood Cliffs, NJ (1979).
-
(1979)
Computer Fraud and Countermeasures
-
-
Krauss, L.I.1
Macgahan, A.2
-
19
-
-
84976780900
-
-
August, 1984, ACM Trans. on Computer Systems
-
Landwehr C.E., Heitmeyer C.L., and McLean J., “A Security Model for Military Message System”, 2:3 (August, 1984) pp.198–222. ACM Trans. on Computer Systems
-
A Security Model for Military Message System
, vol.2
, Issue.3
, pp. 198-222
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
McLean, J.3
-
20
-
-
84976769948
-
Computation and Communication in R*: A Distributed Database Manager
-
(February) 1984. Also in Proc. 9th ACM Symposium on Operating Systems Principles (Bretton Woods, October
-
Lindsay B.G., Haas L.M., Mohan C., Wilms P.F., Yost R.A., “Computation and Communication in R*: A Distributed Database Manager”, ACM Trans. on Computer Systems 2:1 (February) 1984. Also in Proc. 9th ACM Symposium on Operating Systems Principles (Bretton Woods, October, 1983)
-
(1983)
ACM Trans. on Computer Systems
, vol.2
, Issue.1
-
-
Lindsay, B.G.1
Haas, L.M.2
Mohan, C.3
Wilms, P.F.4
Yost, R.A.5
-
22
-
-
0010060884
-
Query Processing in R*
-
W. Kim, D. Reiner, and D. Batory, Eds.), Springer-Verlag
-
Lohman G.M., Mohan C., Haas L.M., Daniels D. Lindsay B.G., Selinger P.G., Wilms P.F., “Query Processing in R*”, In Query Processing in Database Systems (W. Kim, D. Reiner, and D. Batory, Eds.), Springer-Verlag, (1985).
-
(1985)
Query Processing in Database Systems
-
-
Lohman, G.M.1
Mohan, C.2
Haas, L.M.3
Daniels, D.4
Lindsay, B.G.5
Selinger, P.G.6
Wilms, P.F.7
-
24
-
-
0021308587
-
Security Considerations for Personal Computers
-
Murray W.H., “Security Considerations for Personal Computers”, IBM Systems Journal 23:3 1984.
-
(1984)
IBM Systems Journal
, vol.23
, pp. 3
-
-
Murray, W.H.1
-
25
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
December, 1978
-
Needham R.M., and Schroeder M.D., “Using Encryption for Authentication in Large Networks of Computers”, Communications of the ACM 20:12 (December, 1978).
-
Communications of the ACM
, vol.20
, Issue.12
-
-
Needham, R.M.1
Schroeder, M.D.2
-
27
-
-
0021425586
-
Can Computer Crime be Stopped?
-
May
-
Perry T.S, and Wallich P., “Can Computer Crime be Stopped?”, IEEE Spectrum 21:5 (May, 1984) pp.34–45.
-
(1984)
IEEE Spectrum
, vol.21
, Issue.5
, pp. 34-45
-
-
Perry, T.S.1
Wallich, P.2
-
28
-
-
0018322448
-
UCLA Secure UNIX
-
1979 NCC, AFIPS Press
-
Popek, G. et al., “UCLA Secure UNIX”, in AFIPS Conf. Proc. 48, 1979 NCC, AFIPS Press (1979) pp.355–364.
-
(1979)
AFIPS Conf. Proc. 48
, pp. 355-364
-
-
Popek, G.1
-
29
-
-
0020779556
-
A Distributed Secure System
-
July, 1983
-
Rushby J., and Randell B., “A Distributed Secure System”, IEEE Computer 16:7 (July, 1983) pp.55–67.
-
IEEE Computer
, vol.16
, Issue.7
, pp. 55-67
-
-
Rushby, J.1
Randell, B.2
-
30
-
-
85034760862
-
-
“SQL/Data System: Application Programming”, SH24-5018
-
IBM Corporation, “SQL/Data System: Application Programming”, SH24-5018 (1981).
-
(1981)
-
-
-
31
-
-
84976702115
-
The Design and Implementation of INGRES
-
September, 1976
-
Stonebraker M., Wong E., Krep P., and Held G., “The Design and Implementation of INGRES”, ACM Trans. on Database Systems 1:3 (September, 1976).
-
ACM Trans. on Database Systems
, vol.1
, Issue.3
-
-
Stonebraker, M.1
Wong, E.2
Krep, P.3
Held, G.4
-
32
-
-
0020821853
-
MULTISAFE — A Modular Multiprocessing Approach to Secure Database Management
-
September
-
Trueblood R.P, Hartson H.R., and Martin J.J., “MULTISAFE — A Modular Multiprocessing Approach to Secure Database Management”, ACM Trans. on Database Systems 8:3 (September, 1983) pp.382–409.
-
(1983)
ACM Trans. on Database Systems
, vol.8
, Issue.3
, pp. 382-409
-
-
Trueblood, R.P.1
Hartson, H.R.2
Martin, J.J.3
-
33
-
-
0020762394
-
Security Mechanisms in High-Level Network Protocols
-
June, 1983
-
Voydock V.L., and Kent S.T., “Security Mechanisms in High-Level Network Protocols”, ACM Computing Surveys 15:2 (June, 1983) pp.135–171.
-
ACM Computing Surveys
, vol.15
, Issue.2
, pp. 135-171
-
-
Voydock, V.L.1
Kent, S.T.2
-
34
-
-
0018983212
-
Specification and Verification of the UCLA Unix Security Kernel
-
February
-
Walker B.J., Kemmerer R.A., and Popek G.J., “Specification and Verification of the UCLA Unix Security Kernel”, Communications of the ACM 23:2 (February, 1980) pp.118–131.
-
(1980)
Communications of the ACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Walker, B.J.1
Kemmerer, R.A.2
Popek, G.J.3
-
35
-
-
0020259222
-
R*: An Overview of the Architecture
-
P.Scheuermann, ed.), Academic Press (New York
-
Williams R., Daniels D., Haas L.M., Lapis G., Lindsay B.G., Ng P., Obermark R., Selinger P.G., Walker A., Wilms P.F., Yost R.A., “R*: An Overview of the Architecture”, in Improving Database Usability and Responsiveness, (P.Scheuermann, ed.), Academic Press (New York, 1982) pp.1–27.
-
(1982)
Improving Database Usability and Responsiveness
, pp. 1-27
-
-
Williams, R.1
Daniels, D.2
Haas, L.M.3
Lapis, G.4
Lindsay, B.G.5
Ng, P.6
Obermark, R.7
Selinger, P.G.8
Walker, A.9
Wilms, P.F.10
Yost, R.A.11
-
36
-
-
0020275745
-
A Database Authorization Mechanism Supporting Individual and Group Authorization
-
(van de Riet and Litwin, Eds.), North-Holland Publishing Company
-
Wilms P.F. “A Database Authorization Mechanism Supporting Individual and Group Authorization”, in Distributed Data Sharing Systems, (van de Riet and Litwin, Eds.), North-Holland Publishing Company (1982).
-
(1982)
Distributed Data Sharing Systems
-
-
Wilms, P.F.1
-
37
-
-
0019009078
-
OSI Reference Model — The ISO Model of Architecture for Open System Interconnection
-
April, 1980
-
Zimmermann H., “OSI Reference Model — The ISO Model of Architecture for Open System Interconnection”, IEEE Trans. on Communications 28:4 (April, 1980) pp.425–432.
-
IEEE Trans. on Communications
, vol.28
, Issue.4
, pp. 425-432
-
-
Zimmermann, H.1
|