메뉴 건너뛰기




Volumn , Issue , 2005, Pages 1-620

Database and applications security: Integrating information security and data management

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85055556304     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9780203486061     Document Type: Book
Times cited : (36)

References (534)
  • 1
    • 85055522378 scopus 로고
    • Special issue on heterogeneous database systems. ACM Computing Surveys 22: 3, 1990.
    • (1990) ACM Computing Surveys , vol.22 , pp. 3
  • 2
    • 85055513249 scopus 로고    scopus 로고
    • Special issue on components and frameworks. Communications of the ACM 40: 10, 1997.
    • (1997) Communications of the ACM , vol.40 , pp. 10
  • 8
    • 0020148286 scopus 로고
    • An implementation tec hnique for database quer y languages
    • Buneman, P. et al. An implementation tec hnique for database quer y languages. ACM Transactions on Database Systems 7: 2, 1982.
    • (1982) ACM Transactions on Database Systems , vol.7 , pp. 2
    • Buneman, P.1
  • 11
    • 84976766949 scopus 로고
    • The entity relationship model—Toward a unified view of data
    • Chen, P. The entity relationship model—Toward a unified view of data. ACM Transactions on Database Systems 1: 1, 1976.
    • (1976) ACM Transactions on Database Systems , vol.1 , pp. 1
    • Chen, P.1
  • 12
    • 0014797273 scopus 로고
    • A relational model of data for larg e shared data banks
    • Codd, E.F. A relational model of data for larg e shared data banks. Communications of the ACM 13: 6, 1970.
    • (1970) Communications of the ACM , vol.13 , pp. 6
    • Codd, E.F.1
  • 14
    • 85055471987 scopus 로고    scopus 로고
    • Proceedings of the IEEE Data Engineering Conference Series
    • Los Alamitos, CA
    • Proceedings of the IEEE Data Engineering Conference Series. IEEE Computer Society Press: Los Alamitos, CA.
    • IEEE Computer Society
  • 16
    • 85055471945 scopus 로고    scopus 로고
    • Ed. B. Thuraisingham. Auerbach: New York
    • Data Management Handbook Supplement. Ed. B. Thuraisingham. Auerbach: New York, 1996.
    • (1996)
  • 17
    • 85055565630 scopus 로고    scopus 로고
    • ed. B. Thuraisingham. Auerbach: New York
    • Data Management Handbook. ed. B. Thuraisingham. Auerbach: New York, 1997.
    • (1997)
  • 18
    • 85055547098 scopus 로고    scopus 로고
    • MIT Total Data Quality Management Program
    • MIT Total Data Quality Management Program. Available at http://web.mit.edu/tdqm/www/index.shtml.
  • 20
    • 0022079381 scopus 로고
    • The category concept: An extension to the entity relationship model
    • Elmasri, R. et al. The category concept: An extension to the entity relationship model. Data and Knowledge Engineering Journal 1: 2, 1985.
    • (1985) Data and Knowledge Engineering Journal , vol.1 , pp. 2
    • Elmasri, R.1
  • 23
    • 85055470448 scopus 로고    scopus 로고
    • Special issue: Heterogeneous database systems
    • December
    • Special issue: Heterogeneous database systems, IEEE Computer, 24: 12, December 1999.
    • (1999) IEEE Computer , vol.24 , pp. 12
  • 26
    • 85055568172 scopus 로고    scopus 로고
    • Kdnuggets
    • Kdnuggets. Available at www.kdn.com.
  • 30
    • 85055521485 scopus 로고    scopus 로고
    • IEEE Mass Storage Systems Technical Committee
    • IEEE Mass Storage Systems Technical Committee. Available at http://www.msstc.org/.
  • 31
    • 85055569917 scopus 로고
    • Morgan Kaufmann: San Mateo, CA
    • Object Database Standard: ODMB 93. Object Database Management Group, Morgan Kaufmann: San Mateo, CA, 1993.
    • (1993) Object Database Management Group
  • 38
    • 85055511972 scopus 로고
    • American National Standards Institute, Draft
    • SQL3. American National Standards Institute, Draft, 1992.
    • (1992)
  • 48
    • 0026836188 scopus 로고
    • Mediators in the arc hitecture of future information systems
    • March
    • Wiederhold, G. Mediators in the arc hitecture of future information systems. IEEE Computer. 25: 3, (March) 1992.
    • (1992) IEEE Computer , vol.25 , Issue.3
    • Wiederhold, G.1
  • 50
    • 85055500289 scopus 로고
    • Committee on Multilev el Data Management Security, Multilevel Data Management Security. National Academy Press: Washington, DC
    • Air Force Studies Board, Committee on Multilev el Data Management Security, Multilevel Data Management Security. National Academy Press: Washington, DC, 1983.
    • (1983)
  • 54
    • 0004190705 scopus 로고
    • Addison-Wesley: Reading, MA
    • Castano, S. et al. Database Security. Addison-Wesley: Reading, MA, 1995.
    • (1995) Database Security
    • Castano, S.1
  • 59
    • 77954107830 scopus 로고    scopus 로고
    • Secure database systems
    • eds. M. Piatini and O. Diaz, Artech, London, UK
    • Ferrari, E. and Thuraisingham, B. Secure database systems. In Advances in Database Systems, eds. M. Piatini and O. Diaz, Artech, London, UK, 2000.
    • (2000) Advances in Database Systems
    • Ferrari, E.1    Thuraisingham, B.2
  • 69
    • 85055485709 scopus 로고    scopus 로고
    • National Computer Security Center and National Institute of Standards and Technology Publication, MD
    • Proceedings of the National Computer Security Conference Series. National Computer Security Center and National Institute of Standards and Technology Publication, MD.
    • Proceedings of the National Computer Security Conference Series
  • 71
    • 85055507947 scopus 로고    scopus 로고
    • The Object Management Group
    • The Object Management Group. Available at www.omg.org.
  • 73
    • 85055505907 scopus 로고
    • Trusted Computer Systems Evaluation Criteria. National Computer Security Center, Linthicum, MD
    • Trusted Computer Systems Evaluation Criteria. National Computer Security Center, Linthicum, MD, 1985.
    • (1985)
  • 74
    • 85055531189 scopus 로고
    • Trusted Database Interpretation. National Computer Security Center, Linthicum, MD
    • Trusted Database Interpretation. National Computer Security Center, Linthicum, MD, 1991.
    • (1991)
  • 75
    • 85055474730 scopus 로고
    • Trusted Network Interpretation. National Computer Security center, Linthicum, MD
    • Trusted Network Interpretation. National Computer Security center, Linthicum, MD, 1987.
    • (1987)
  • 76
    • 0004141908 scopus 로고
    • Prentice-Hall: Upper Saddle River, NJ
    • Tannenbaum, A. Computer Networks. Prentice-Hall: Upper Saddle River, NJ, 1990.
    • (1990) Computer Networks
    • Tannenbaum, A.1
  • 77
    • 84976740459 scopus 로고
    • Mandatory security for object-oriented database systems
    • New Orleans, LA, October
    • Thuraisingham, B. Mandatory security for object-oriented database systems. In Proceedings of the ACM OOPOSLA Conference, New Orleans, LA, October, 1989.
    • (1989) Proceedings of the ACM OOPOSLA Conference
    • Thuraisingham, B.1
  • 78
    • 85055576796 scopus 로고
    • Multilevel security in distributed database systems
    • Thuraisingham, B. Multilevel security in distributed database systems. Computers and Security 10: 6, 1991.
    • (1991) Computers and Security , vol.10 , pp. 6
    • Thuraisingham, B.1
  • 80
    • 85055576796 scopus 로고
    • Multilevel security in federated database systems
    • Thuraisingham, B. Multilevel security in federated database systems. Computers and Security 13: 6, 1994.
    • (1994) Computers and Security , vol.13 , pp. 6
    • Thuraisingham, B.1
  • 81
    • 0345897549 scopus 로고
    • Special issue on computer-supported cooperative work
    • Special issue on computer-supported cooperative work. Communications of the ACM, 34: 12, December 1991.
    • (1991) Communications of the ACM , vol.34 , pp. 12
  • 85
    • 85055478897 scopus 로고
    • ed. A. Hurson et al. IEEE Computer Society Press: Los Alamitos, CA
    • Parallel Architectures for Databases, IEEE Tutorial. ed. A. Hurson et al. IEEE Computer Society Press: Los Alamitos, CA, 1989.
    • (1989) IEEE Tutorial
  • 86
    • 85055489257 scopus 로고    scopus 로고
    • Special issue in collaborative computing
    • Special issue in collaborative computing. IEEE Computer 32: 9, 1999.
    • (1999) IEEE Computer , vol.32 , pp. 9
  • 87
    • 85055514739 scopus 로고    scopus 로고
    • Special issue in audio mining
    • Special issue in audio mining. IEEE Computer 36: 2, 2003.
    • (2003) IEEE Computer , vol.36 , pp. 2
  • 94
    • 85055525044 scopus 로고    scopus 로고
    • Available at http://www.w3.org/MarkUp/SGML/.
  • 96
  • 97
    • 17244364718 scopus 로고    scopus 로고
    • Piazza peer-to-peer data management
    • Tatarinov, I. et al. Piazza peer-to-peer data management. ACM SIGMOD Record 32: 3, 2003.
    • (2003) ACM SIGMOD Record , vol.32 , pp. 3
    • Tatarinov, I.1
  • 106
    • 84976753050 scopus 로고
    • An object-oriented approach to multimedia databases
    • Washington, DC, June
    • Woelk, D. et al. An object-oriented approach to multimedia databases. In Proceedings of the ACM SIGMOD Conference, Washington, DC, June 1986.
    • (1986) Proceedings of the ACM SIGMOD Conference
    • Woelk, D.1
  • 109
  • 110
  • 112
    • 0002045898 scopus 로고    scopus 로고
    • Role-based access control models
    • Sandhu, R. et al. Role-based access control models. IEEE Computer 29: 2, 1996.
    • (1996) IEEE Computer , vol.29 , pp. 2
    • Sandhu, R.1
  • 113
    • 84914732721 scopus 로고    scopus 로고
    • Access control in a relational data base management system by query modification
    • ACM: New York
    • Stonebraker, M. and Wong, E. Access control in a relational data base management system by query modification. In Proceedings of the ACM Annual Conference, ACM: New York, 1974.
    • Proceedings of the ACM Annual Conference , pp. 1974
    • Stonebraker, M.1    Wong, E.2
  • 114
    • 48249083391 scopus 로고    scopus 로고
    • STAR-tree: An index structure for efficient evaluation of spatiotemporal authorization
    • Spain, July
    • Atluri, V. and Guo, Q. STAR-tree: An index structure for efficient evaluation of spatiotemporal authorization, In Proceedings of the IFIP Database Security Conference, Sitges, Spain, July, 2004.
    • Proceedings of the IFIP Database Security Conference, Sitges , pp. 2004
    • Atluri, V.1    Guo, Q.2
  • 115
    • 85055469084 scopus 로고
    • Integrity constraint processing during transaction processing
    • Bertino, E. and Musto, D. Integrity constraint processing during transaction processing. Acta Informatica, 26: 1, 1989.
    • (1989) Acta Informatica , vol.26 , pp. 1
    • Bertino, E.1    Musto, D.2
  • 116
  • 118
    • 85055470992 scopus 로고
    • Multilevel security for relational database systems
    • Dwyer, P. et al. Multilevel security for relational database systems. Computers and Security 6: 3, 1987.
    • (1987) Computers and Security , vol.6 , pp. 3
    • Dwyer, P.1
  • 119
  • 120
  • 121
    • 0024627547 scopus 로고
    • Secure query processing strategies
    • Keefe, T. et al. Secure query processing strategies. IEEE Computer 22: 3, 1989.
    • (1989) IEEE Computer , vol.22 , pp. 3
    • Keefe, T.1
  • 122
    • 85055469216 scopus 로고    scopus 로고
    • Smart Center Management. Available at http://www.unipalm.co.uk/products/e-security/check-point/$smartcenter-management.cfm.
  • 123
    • 85055559269 scopus 로고
    • Draft. American National Standards Institute
    • SQL3. Draft. American National Standards Institute, 1992.
    • (1992)
  • 124
    • 84914732721 scopus 로고    scopus 로고
    • Access control in a relational data base management system by query modification
    • ACM: New York
    • Stonebraker, M. and Wong, E. Access control in a relational data base management system by query modification. In Proceedings of the ACM Annual Conference, ACM: New York, 1974.
    • (1974) Proceedings of the ACM Annual Conference
    • Stonebraker, M.1    Wong, E.2
  • 125
    • 0038896772 scopus 로고
    • Security checking in relational database management systems augmented with inference engines
    • Thuraisingham, B. Security checking in relational database management systems augmented with inference engines. Computers and Security 6: 6, 1987.
    • (1987) Computers and Security , vol.6 , pp. 6
    • Thuraisingham, B.1
  • 128
    • 85055532644 scopus 로고
    • Committee on Multilev el Data Management Security. Multilevel Data Management Security. National Academy Press: Washington, DC
    • Air Force Studies Board, Committee on Multilev el Data Management Security. Multilevel Data Management Security. National Academy Press: Washington, DC, 1983.
    • (1983)
  • 129
    • 85055553011 scopus 로고    scopus 로고
    • Providing different degrees of recency options to transactions in multilevel secure databases
    • Rensselaerville, New York, August 1995. North Holland: Amsterdam
    • Atluri, V. et al. Providing different degrees of recency options to transactions in multilevel secure databases. In Proceedings of the IFIP Database Security Conference, Rensselaerville, New York, August 1995. North Holland: Amsterdam, 1996.
    • (1996) Proceedings of the IFIP Database Security Conference
    • Atluri, V.1
  • 130
    • 85055558492 scopus 로고    scopus 로고
    • Object-oriented approac h to developing real-time infrastructure and data manager
    • Laguna Beach, CA, February
    • Bensley E. et al. Object-oriented approac h to developing real-time infrastructure and data manager. In Proceedings of the IEEE Workshop on Object-Oriented Real-Time Systems, Laguna Beach, CA, February 1996.
    • (1996) Proceedings of the IEEE Workshop on Object-Oriented Real-Time Systems
    • Bensley, E.1
  • 131
    • 0020148286 scopus 로고
    • An implementation tec hnique for database quer y languages
    • Buneman, P. et al. An implementation tec hnique for database quer y languages. ACM Transactions on Database Systems 7: 2, 1982.
    • (1982) ACM Transactions on Database Systems , vol.7 , pp. 2
    • Buneman, P.1
  • 133
    • 84976766949 scopus 로고
    • The entity-relationship model—Toward a unified view of data
    • Chen, P. The entity-relationship model—Toward a unified view of data. ACM Transactions on Database Systems 1: 1, 1976.
    • (1976) ACM Transactions on Database Systems , vol.1 , pp. 1
    • Chen, P.1
  • 134
    • 85052682088 scopus 로고
    • The SINTRA data model: Structure and operations
    • Huntsville AL, 1993. North Holland: Amsterdam
    • Costich, O. et al. The SINTRA data model: Structure and operations. In Proceedings of the IFIP Database Security Conference, Huntsville AL, 1993. North Holland: Amsterdam, 1994.
    • (1994) Proceedings of the IFIP Database Security Conference
    • Costich, O.1
  • 141
    • 85052674079 scopus 로고
    • Views as the security objects in a multilevel secure relational database management system
    • Oakland, CA, April
    • Garvey, C. and Wu, A. Views as the security objects in a multilevel secure relational database management system. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, April 1988.
    • (1988) Proceedings of the IEEE Symposium on Security and Privacy
    • Garvey, C.1    Wu, A.2
  • 144
    • 85055590390 scopus 로고
    • Design overview for retrofitting integritylock architecture onto a commercial DBMS
    • Oakland, CA, April
    • Graubart, R. and Duffy, K. Design overview for retrofitting integritylock architecture onto a commercial DBMS. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, April 1985.
    • (1985) Proceedings of the IEEE Symposium on Security and Privacy
    • Graubart, R.1    Duffy, K.2
  • 145
    • 85055562446 scopus 로고
    • A model of a protected data management system. Technical Report ESD-TR-76-289, I. P. Sharp Associates: Bedford, MA, June
    • Grohn, M. A model of a protected data management system. Technical Report ESD-TR-76-289, I. P. Sharp Associates: Bedford, MA, June 1976.
    • (1976)
    • Grohn, M.1
  • 146
    • 85055503145 scopus 로고
    • Secure data management system. Technical Report RADC-TR-75-266, System Development Corp. Santa Monica, CA, November
    • Hinke T. and Schaefer, M. Secure data management system. Technical Report RADC-TR-75-266, System Development Corp. Santa Monica, CA, November 1975.
    • (1975)
    • Hinke, T.1    Schaefer, M.2
  • 147
    • 85055536980 scopus 로고
    • IEEE Computer 16: 7, 1983.
    • (1983) IEEE Computer , vol.16 , Issue.7
  • 150
    • 0025137221 scopus 로고
    • Transaction processing in multilevel-secure databases using replicated architecture
    • Oakland, CA, April
    • Jajodia, S. and Kogan, B. Transaction processing in multilevel-secure databases using replicated architecture. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, April 1990.
    • (1990) Proceedings of the IEEE Symposium on Security and Privacy
    • Jajodia, S.1    Kogan, B.2
  • 153
    • 0024627547 scopus 로고
    • Secure query processing strategies
    • March
    • Keefe, T. et al. Secure query processing strategies. IEEE Computer 22: 3, March 1989.
    • (1989) IEEE Computer , vol.22 , pp. 3
    • Keefe, T.1
  • 157
    • 84902436516 scopus 로고    scopus 로고
    • Using parameterized UML to specify and compose access control models
    • Lausanne, Switzerland, 2003. Kluwer: Hingham, MA
    • Ray, I. et al. Using parameterized UML to specify and compose access control models. In Proceedings of the IFIP Conference on Integrity and Control, Lausanne, Switzerland, 2003. Kluwer: Hingham, MA, 2004.
    • (2004) Proceedings of the IFIP Conference on Integrity and Control
    • Ray, I.1
  • 158
    • 85055559343 scopus 로고
    • A fine grained access control model for objectoriented DBMSs
    • Hildesheim, Germany, August
    • Rosenthal, A. et al. A fine grained access control model for objectoriented DBMSs. In Proceedings IFIP Database Security Conference, Hildesheim, Germany, August 1994.
    • (1994) Proceedings IFIP Database Security Conference
    • Rosenthal, A.1
  • 159
    • 85055540026 scopus 로고
    • Design and implementation of a secure distributed query processor
    • Rubinovitz, H. and Thuraisingham, B. Design and implementation of a secure distributed query processor. Journal of Systems and Software, 21: 1, 1993.
    • (1993) Journal of Systems and Software , vol.21 , pp. 1
    • Rubinovitz, H.1    Thuraisingham, B.2
  • 160
    • 0028055452 scopus 로고
    • Applying OMT for designing multilevel database applications
    • Huntsville, AL, September 1993. North Holland: Amsterdam
    • Sell, P. and Thuraisingham, B. Applying OMT for designing multilevel database applications. In Proceedings of the IFIP Database Security Conference, Huntsville, AL, September 1993. North Holland: Amsterdam, 1994.
    • (1994) Proceedings of the IFIP Database Security Conference
    • Sell, P.1    Thuraisingham, B.2
  • 161
    • 85055491278 scopus 로고    scopus 로고
    • An adaptive policy for improved timeliness in secure database systems
    • Rensselaerville, New York, August 1995. Chapman & Hall: London
    • Son, S. et al. An adaptive policy for improved timeliness in secure database systems. In Proceedings of the IFIP Databases Security Conference, Rensselaerville, New York, August 1995. Chapman & Hall: London, 1996.
    • (1996) Proceedings of the IFIP Databases Security Conference
    • Son, S.1
  • 163
    • 85055535574 scopus 로고
    • Trusted Computer Systems Evaluation Criteria, National Computer Security Center, MD
    • Trusted Computer Systems Evaluation Criteria, National Computer Security Center, MD, 1985.
    • (1985)
  • 164
    • 85055469421 scopus 로고
    • Trusted Database Interpretation. National Computer Security Center, Linthicum, MD
    • Trusted Database Interpretation. National Computer Security Center, Linthicum, MD, 1991.
    • (1991)
  • 165
    • 0038896772 scopus 로고
    • Security checking in relational database management systems augmented with inference engines
    • Thuraisingham, B. Security checking in relational database management systems augmented with inference engines. Computers and Security 6: 6, 1987.
    • (1987) Computers and Security , vol.6 , pp. 6
    • Thuraisingham, B.1
  • 167
    • 84976740459 scopus 로고
    • Mandatory security for object-oriented database systems
    • October 1989. ACM: New York
    • Thuraisingham, B. Mandatory security for object-oriented database systems. In Proceedings of the ACM OOPOSLA Conference, October 1989. ACM: New York, 1989.
    • (1989) Proceedings of the ACM OOPOSLA Conference
    • Thuraisingham, B.1
  • 169
    • 85055576796 scopus 로고
    • Multilevel security for functional database systems
    • Thuraisingham, B. Multilevel security for functional database systems. Computers and Security, 9: 6, 1989.
    • (1989) Computers and Security , vol.9 , pp. 6
    • Thuraisingham, B.1
  • 170
    • 33947244773 scopus 로고
    • Multilevel security for multimedia database systems
    • Halifax, England, September 1990. North Holland: Amsterdam
    • Thuraisingham, B. Multilevel security for multimedia database systems. In Proceedings of the IFIP Database Security Conference, Halifax, England, September 1990. North Holland: Amsterdam, 1991.
    • (1991) Proceedings of the IFIP Database Security Conference
    • Thuraisingham, B.1
  • 171
    • 85055222385 scopus 로고
    • Recursion theoretic proper ties of the inference problem
    • Franconia, NH, June 1990 (also available as MITRE Technical Paper MTP291 June
    • Thuraisingham, B. Recursion theoretic proper ties of the inference problem. Presented at the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1990 (also available as MITRE Technical Paper MTP291 June 1990).
    • (1990) IEEE Computer Security Foundations Workshop
    • Thuraisingham, B.1
  • 172
    • 85054221583 scopus 로고
    • The use of conceptual structures to handle the inference problem
    • Shepherdstown, WV. North Holland: Amsterdam
    • Thuraisingham, B. The use of conceptual structures to handle the inference problem. In Proceedings of the IFIP Database Security Conference, Shepherdstown, WV. North Holland: Amsterdam, 1992
    • (1992) Proceedings of the IFIP Database Security Conference
    • Thuraisingham, B.1
  • 173
    • 85055576796 scopus 로고
    • Multilevel security for distributed database systems
    • Thuraisingham, B. Multilevel security for distributed database systems. Computers and Security, 11: 6, 1991.
    • (1991) Computers and Security , vol.11 , pp. 6
    • Thuraisingham, B.1
  • 176
    • 1442321816 scopus 로고
    • Concurrency control in trusted database management systems: A survey
    • Thuraisingham, B. and Ko, H. Concurrency control in trusted database management systems: A survey, ACM SIGMOD Record, 22: 4, 1993.
    • (1993) ACM SIGMOD Record , vol.22 , pp. 4
    • Thuraisingham, B.1    Ko, H.2
  • 177
    • 85052688206 scopus 로고
    • Towards the design of a standard multilevel relational data model
    • Thuraisingham, B. Towards the design of a standard multilevel relational data model, Computer Standards and Interface Journal, 15: 1, 1993.
    • (1993) Computer Standards and Interface Journal , vol.15 , pp. 1
    • Thuraisingham, B.1
  • 178
    • 85055576796 scopus 로고
    • Multilevel security for federated database system
    • Thuraisingham, B. Multilevel security for federated database system. Computers and Security, 14: 6, 1994.
    • (1994) Computers and Security , vol.14 , pp. 6
    • Thuraisingham, B.1
  • 181
    • 85052672931 scopus 로고    scopus 로고
    • Using SWORD for the military aircraft command example database
    • Vancouver, British Columbia. North Holland: Amsterdam
    • Wiseman, S. Using SWORD for the military aircraft command example database. In Proceedings of the IFIP Database Security Conference, Vancouver, British Columbia. North Holland: Amsterdam, 1993.
    • Proceedings of the IFIP Database Security Conference , pp. 1993
    • Wiseman, S.1
  • 184
    • 77954107830 scopus 로고    scopus 로고
    • Secure database systems
    • eds. M. Piatini and O. Diaz, Artech: London, UK
    • Ferrari E. and Thuraisingham, B. Secure database systems. In Advances in Database Management, eds. M. Piatini and O. Diaz, Artech: London, UK, 2000.
    • (2000) Advances in Database Management
    • Ferrari, E.1    Thuraisingham, B.2
  • 186
    • 85052697580 scopus 로고
    • A comparison of three secure DBMS arc hitectures
    • Monterey, CA, 1989. North Holland: Amsterdam
    • Graubart, R. A comparison of three secure DBMS arc hitectures. In Proceedings of the IFIP Database Security Conference, Monterey, CA, 1989. North Holland: Amsterdam, 1989.
    • (1989) Proceedings of the IFIP Database Security Conference
    • Graubart, R.1
  • 187
    • 85052684905 scopus 로고
    • DBMS trusted computing base taxonomy
    • Monterey, CA, 1989. North Holland: Amsterdam
    • Hinke, T. DBMS trusted computing base taxonomy. In Proceedings of the IFIP Database Security Conference, Monterey, CA, 1989. North Holland: Amsterdam, 1989.
    • (1989) Proceedings of the IFIP Database Security Conference
    • Hinke, T.1
  • 189
    • 85055560450 scopus 로고
    • Trusted Database Interpretation. National Computer Security Center. Linthicum, MD
    • Trusted Database Interpretation. National Computer Security Center. Linthicum, MD, 1991.
    • (1991)
  • 190
    • 85055495401 scopus 로고    scopus 로고
    • Recent developments in database security
    • Orlando, FL, September 1989. Also available as MITRE Paper, 1989 (publicly released)
    • Thuraisingham, B. Recent developments in database security. In Proceedings of the 1989 IEEE COMPSAC Conference Tutorial Proceedings, Orlando, FL, September 1989. Also available as MITRE Paper, 1989 (publicly released).
    • Proceedings of the 1989 IEEE COMPSAC Conference Tutorial Proceedings
    • Thuraisingham, B.1
  • 192
    • 85055490398 scopus 로고
    • The advanced secure DBMS: Making secure DBMSs usable
    • Kingston, Canada, October 1988. North Holland: Amsterdam
    • Garvey, C. et al. The advanced secure DBMS: Making secure DBMSs usable. In Proceedings of the IFIP Database Security Conference, Kingston, Canada, October 1988. North Holland: Amsterdam, 1989.
    • (1989) Proceedings of the IFIP Database Security Conference
    • Garvey, C.1
  • 195
    • 0027853601 scopus 로고
    • Design and implementation of a database inference controller
    • Thuraisingham, B. et al. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
    • (1993) Data and Knowledge Engineering Journal , vol.11 , pp. 3
    • Thuraisingham, B.1
  • 196
    • 24644455920 scopus 로고    scopus 로고
    • Privacy constraint processing in a privacy enhanced database system
    • Thuraisingham, B. Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal, 2005 (to appear).
    • (2005) Data and Knowledge Engineering Journal
    • Thuraisingham, B.1
  • 197
    • 85055571738 scopus 로고
    • On the problem of security in data bases
    • Monterey, CA, 1989. North Holland: Amsterdam
    • Simon, W. On the problem of security in data bases. In Proceedings of the IFIP Database Security Conference, Monterey, CA, 1989. North Holland: Amsterdam, 1990.
    • (1990) Proceedings of the IFIP Database Security Conference
    • Simon, W.1
  • 198
    • 85052672931 scopus 로고    scopus 로고
    • Using SWORD for the military aircraft command example database
    • Vancouver, British Columbia, August 1992. North Holland: Amsterdam
    • Wiseman, S. Using SWORD for the military aircraft command example database. In Proceedings of the IFIP Database Security Conference, Vancouver, British Columbia, August 1992. North Holland: Amsterdam, 1993.
    • (1993) Proceedings of the IFIP Database Security Conference
    • Wiseman, S.1
  • 199
    • 0031222594 scopus 로고    scopus 로고
    • Transaction processing in multilevel secure databases with kernelized architectures: Challenges and solutions
    • Atluri, V. Transaction processing in multilevel secure databases with kernelized architectures: Challenges and solutions. IEEE Transactions on Knowledge and Data Engineering 9: 5, 1997.
    • (1997) IEEE Transactions on Knowledge and Data Engineering , vol.9 , pp. 5
    • Atluri, V.1
  • 201
    • 0027767269 scopus 로고
    • Maintaining multilevel transaction atomicity in MLS database systems with kernelized architecture
    • Vancouver, Canada 1992. North Holland: Amsterdam
    • Costich, O. and Jajodia, S. Maintaining multilevel transaction atomicity in MLS database systems with kernelized architecture. In Proceedings of the IFIP Database Security Conference, Vancouver, Canada 1992. North Holland: Amsterdam, 1993.
    • (1993) Proceedings of the IFIP Database Security Conference
    • Costich, O.1    Jajodia, S.2
  • 203
    • 85055470992 scopus 로고
    • Multilevel security for relational database systems
    • Dwyer, P. et al. Multilevel security for relational database systems. Computers and Security 6: 3, 1987.
    • (1987) Computers and Security , vol.6 , pp. 3
    • Dwyer, P.1
  • 204
    • 0025137221 scopus 로고
    • Transaction processing in multilevel secure databases using replicated architecture
    • Oakland, CA, May
    • Jajodia, S. and Kogan, B. Transaction processing in multilevel secure databases using replicated architecture. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1990.
    • (1990) Proceedings of the IEEE Symposium on Security and Privacy
    • Jajodia, S.1    Kogan, B.2
  • 205
    • 85055466776 scopus 로고
    • Integrating concurrency control and commit alg orithms in distributed multilevel secure databases
    • Huntsville, AL, 1993. North Holland: Amsterdam
    • Jajodia, S. Integrating concurrency control and commit alg orithms in distributed multilevel secure databases. In Proceedings of the IFIP Database Security, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
    • (1994) Proceedings of the IFIP Database Security
    • Jajodia, S.1
  • 206
    • 0024627547 scopus 로고
    • Secure query processing strategies
    • Keefe, T. et al. Secure query processing strategies. IEEE Computer 22: 3, 1989.
    • (1989) IEEE Computer , vol.22 , pp. 3
    • Keefe, T.1
  • 208
    • 1442321816 scopus 로고
    • A survey of concurrency control in trusted database management systems
    • Ko, H. and Thuraisingham, B. A survey of concurrency control in trusted database management systems. ACM SIGMOD Record 22: 4, 1993.
    • (1993) ACM SIGMOD Record , vol.22 , pp. 4
    • Ko, H.1    Thuraisingham, B.2
  • 211
    • 0038896772 scopus 로고
    • Security checking for relational database systems augmented with inference engines
    • Thuraisingham, B. Security checking for relational database systems augmented with inference engines. Computers and Security 6: 6, 1987.
    • (1987) Computers and Security , vol.6 , pp. 6
    • Thuraisingham, B.1
  • 212
    • 85055576796 scopus 로고
    • Multilevel security in distributed database systems
    • Thuraisingham, B. Multilevel security in distributed database systems. Computers and Security 10: 6, 1991.
    • (1991) Computers and Security , vol.10 , pp. 6
    • Thuraisingham, B.1
  • 214
    • 85052682088 scopus 로고
    • The SINTRA data model: Structure and operations
    • Huntsville, AL, 1993. North Holland: Amsterdam
    • Costich, O. et al. The SINTRA data model: Structure and operations. In Proceedings of the IFIP Database Security Conference, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
    • (1994) Proceedings of the IFIP Database Security Conference
    • Costich, O.1
  • 217
    • 85055490398 scopus 로고
    • The advanced secure DBMS: Making secure DBMSs usable
    • Kingston, Ontario, Canada, 1988. North Holland: Amsterdam
    • Garvey, C. et al. The advanced secure DBMS: Making secure DBMSs usable. In Proceedings of the IFIP Database Security Conference, Kingston, Ontario, Canada, 1988. North Holland: Amsterdam, 1989.
    • (1989) Proceedings of the IFIP Database Security Conference
    • Garvey, C.1
  • 221
    • 85052697580 scopus 로고
    • A comparison of three secure DBMS arc hitectures
    • Monterey, CA, 1989. North Holland: Amsterdam
    • Graubart, R. A comparison of three secure DBMS arc hitectures. In Proceedings of the IFIP Database Security Conference, Monterey, CA, 1989. North Holland: Amsterdam, 1990.
    • (1990) Proceedings of the IFIP Database Security Conference
    • Graubart, R.1
  • 222
    • 85055511233 scopus 로고
    • Technical Report, Systems Development Corporation
    • Hinke, T. and Schaefer, M. Secure data management. Technical Report, Systems Development Corporation, 1975.
    • (1975) Secure Data Management
    • Hinke, T.1    Schaefer, M.2
  • 223
    • 85055527288 scopus 로고
    • SDDM—A prototype of a distributed architecture for database security
    • Los Angeles, February
    • Jensen, C. SDDM—A prototype of a distributed architecture for database security. In Proceedings of the IEEE Data Engineering Conference, Los Angeles, February 1989.
    • (1989) Proceedings of the IEEE Data Engineering Conference
    • Jensen, C.1
  • 229
    • 85052672931 scopus 로고    scopus 로고
    • Using SWORD for the military aircraft command example database
    • Vancouver, BC, North Holland: Amsterdam
    • Wiseman, S. Using SWORD for the military aircraft command example database. In Proceedings of the IFIP Database Security Conference, Vancouver, BC, North Holland: Amsterdam, 1993.
    • (1993) Proceedings of the IFIP Database Security Conference
    • Wiseman, S.1
  • 230
    • 84926396434 scopus 로고
    • A machine independent theory of the complexity of recursive functions
    • Blum, M. A machine independent theory of the complexity of recursive functions. Journal of the Association for Computing Machinery 2: 14, 1967.
    • (1967) Journal of the Association for Computing Machinery , vol.2 , pp. 14
    • Blum, M.1
  • 233
    • 0034497773 scopus 로고    scopus 로고
    • Using sample size to limit exposure to data mining
    • Clifton, C. Using sample size to limit exposure to data mining. Journal of Computer Security 8: 4, 2000
    • (2000) Journal of Computer Security , vol.8 , pp. 4
    • Clifton, C.1
  • 234
    • 85055572234 scopus 로고    scopus 로고
    • Deductive object-oriented data model for handling the inference problem
    • San Diego, CA, August
    • Collins, M. et al. Deductive object-oriented data model for handling the inference problem. In Proceedings of the AFCEA Database Colloquium, San Diego, CA, August 1996.
    • (1996) Proceedings of the AFCEA Database Colloquium
    • Collins, M.1
  • 235
  • 236
    • 0018442066 scopus 로고
    • The tracker: A threat to statistical database security
    • Denning, D. The tracker: A threat to statistical database security. ACM Transactions in Database Systems 4: 2, 1979.
    • (1979) ACM Transactions in Database Systems , vol.4 , pp. 2
    • Denning, D.1
  • 237
    • 85060417506 scopus 로고    scopus 로고
    • The inference problem and updates in relational databases
    • Lake Niagara, Canada, 2001. Kluwer: Hingham, MA
    • Farkas, C. et al. The inference problem and updates in relational databases. In Proceedings of the IFIP Database Security Conference, Lake Niagara, Canada, 2001. Kluwer: Hingham, MA, 2002.
    • (2002) Proceedings of the IFIP Database Security Conference
    • Farkas, C.1
  • 239
    • 85055518241 scopus 로고
    • Special issue on computer security
    • Special issue on computer security. IEEE Computer 16: 7, 1983.
    • (1983) IEEE Computer , vol.16 , pp. 7
  • 240
    • 85055475243 scopus 로고    scopus 로고
    • Release control for XML documents
    • Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA
    • Jajodia, S. Release control for XML documents. In Proceedings of the IFIP Conference on Integrity and Control, Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA, 2004.
    • (2004) Proceedings of the IFIP Conference on Integrity and Control
    • Jajodia, S.1
  • 242
    • 0027719323 scopus 로고
    • Inference secure multilevel databases
    • Vancouver, British Columbia, 1992. North Holland: Amsterdam
    • Lin, T.Y. Inference secure multilevel databases. In Proceedings of the IFIP Database Security Conference, Vancouver, British Columbia, 1992. North Holland: Amsterdam, 1993.
    • (1993) Proceedings of the IFIP Database Security Conference
    • Lin, T.Y.1
  • 243
    • 0036389597 scopus 로고    scopus 로고
    • Placing the Chinese walls on the boundary of conflicts analysis of symmetric binary relations
    • Oxford, UK, August
    • Lin, T.Y. Placing the Chinese walls on the boundary of conflicts analysis of symmetric binary relations. In Proceedings of the IEEE COMPSAC Conference, Oxford, UK, August 2002.
    • (2002) Proceedings of the IEEE COMPSAC Conference
    • Lin, T.Y.1
  • 245
    • 85055472014 scopus 로고
    • Hypersemantic data modeling for inference analysis
    • Hildesheim, Germany, 1994. North Holland: Amsterdam
    • Marks, D. et al. Hypersemantic data modeling for inference analysis. In Proceedings of the IFIP Database Security Conference, Hildesheim, Germany, 1994. North Holland: Amsterdam, 1995.
    • (1995) Proceedings of the IFIP Database Security Conference
    • Marks, D.1
  • 249
    • 84976785631 scopus 로고
    • Security and inference in multilevel database and knowledge base systems
    • San Francisco, May
    • Morgenstern, M. Security and inference in multilevel database and knowledge base systems. In Proceedings of the ACM SIGM CD Conference, San Francisco, May 1987.
    • (1987) Proceedings of the ACM SIGM CD Conference
    • Morgenstern, M.1
  • 253
    • 0038896772 scopus 로고
    • Security checking in relational database management systems augmented with inference engines
    • Thuraisingham, B. Security checking in relational database management systems augmented with inference engines. Computers and Security 6: 6, 1987.
    • (1987) Computers and Security , vol.6 , pp. 6
    • Thuraisingham, B.1
  • 255
    • 85055222385 scopus 로고
    • Recursion theoretic properties of the inference problem
    • Franconia, NH, June 1990 (also available as MITRE Technical Paper MTP291, June
    • Thuraisingham, B. Recursion theoretic properties of the inference problem. Presented at the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1990 (also available as MITRE Technical Paper MTP291, June 1990).
    • (1990) IEEE Computer Security Foundations Workshop
    • Thuraisingham, B.1
  • 256
    • 85054221583 scopus 로고
    • The use of conceptual structures to handle the inference problem
    • Shepherdstown, WV, North Holland: Amsterdam
    • Thuraisingham, B. The use of conceptual structures to handle the inference problem. In Proceedings of the IFIP Database Security Conference, Shepherdstown, WV, North Holland: Amsterdam, 1992.
    • (1992) Proceedings of the IFIP Database Security Conference
    • Thuraisingham, B.1
  • 257
    • 33747486880 scopus 로고
    • A nonmonotonic typed multilevel logic for multilevel secure database and knowledge base management systems
    • Franconia, NH, June
    • Thuraisingham, B. A nonmonotonic typed multilevel logic for multilevel secure database and knowledge base management systems. In Proceedings of the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1991.
    • (1991) Proceedings of the IEEE Computer Security Foundations Workshop
    • Thuraisingham, B.1
  • 259
    • 85055933889 scopus 로고
    • A nonmontonic typed multilevel logic for multilevel secure database and knowledge base management systems II
    • Franconia, NH, June
    • Thuraisingham, B. A nonmontonic typed multilevel logic for multilevel secure database and knowledge base management systems II. In Proceedings of the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1992.
    • (1992) Proceedings of the IEEE Computer Security Foundations Workshop
    • Thuraisingham, B.1
  • 262
    • 85055472455 scopus 로고    scopus 로고
    • Release control in database systems
    • Amsterdam, August 2000. North Holland: Amsterdam
    • Wiederhold, G. Release control in database systems. In Proceedings of the IFIP Database Security Conference, Amsterdam, August 2000. North Holland: Amsterdam, 2001.
    • (2001) Proceedings of the IFIP Database Security Conference
    • Wiederhold, G.1
  • 264
    • 85055470992 scopus 로고
    • Multilevel security for relational database systems
    • Dwyer, P. et al. Multilevel security for relational database systems. Computers and Security 6: 3, 1987.
    • (1987) Computers and Security , vol.6 , pp. 3
    • Dwyer, P.1
  • 266
  • 267
    • 85055475243 scopus 로고    scopus 로고
    • Release control for XML documents
    • Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA
    • Jajodia, S. Release control for XML documents. In Proceedings of the IFIP Conference in Integrity and Control, Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA, 2004.
    • (2004) Proceedings of the IFIP Conference in Integrity and Control
    • Jajodia, S.1
  • 268
    • 0024627547 scopus 로고
    • Secure query processing strategies
    • Keefe, T. et al. Secure query processing strategies. IEEE Computer 22: 3, 1989.
    • (1989) IEEE Computer , vol.22 , pp. 3
    • Keefe, T.1
  • 271
    • 84976785631 scopus 로고
    • Security and inference in multilevel database and knowledge base systems
    • San Francisco, May
    • Morgenstern, M. Security and inference in multilevel database and knowledge base systems. In Proceedings of the ACM SIGM CD Conference, San Francisco, May 1987.
    • (1987) Proceedings of the ACM SIGM CD Conference
    • Morgenstern, M.1
  • 272
    • 84914732721 scopus 로고    scopus 로고
    • Access control in a relational data base management system by query modification
    • ACM: New York
    • Stonebraker, M. and Wong, E. Access control in a relational data base management system by query modification. In Proceedings of the ACM Annual Conference. ACM: New York, 1974.
    • (1974) Proceedings of the ACM Annual Conference
    • Stonebraker, M.1    Wong, E.2
  • 273
    • 0038896772 scopus 로고
    • Security checking in relational database management systems augmented with inference engines
    • Thuraisingham, B. Security checking in relational database management systems augmented with inference engines. Computers and Security 6: 6, 1987.
    • (1987) Computers and Security , vol.6 , pp. 6
    • Thuraisingham, B.1
  • 274
    • 85055532018 scopus 로고
    • Towards the design of secure database and knowledge base management system
    • Thuraisingham, B. Towards the design of secure database and knowledge base management system. Data and Knowledge Engineering Journal 5: 1, 1990.
    • (1990) Data and Knowledge Engineering Journal , vol.5 , pp. 1
    • Thuraisingham, B.1
  • 278
    • 84877330259 scopus 로고
    • An overview of the KL-ONE knowledge representation system
    • Brachmann, R. and Schmalze, J. An overview of the KL-ONE knowledge representation system, Cognitive Science, 9: 2, 1985.
    • (1985) Cognitive Science , vol.9 , pp. 2
    • Brachmann, R.1    Schmalze, J.2
  • 282
    • 0004030676 scopus 로고
    • PhD Thesis, Carnegie Institute of Technology
    • Quillian R. Semantic memory. PhD Thesis, Carnegie Institute of Technology, 1966.
    • (1966) Semantic Memory
    • Quillian, R.1
  • 285
    • 85055581703 scopus 로고
    • Conceptual dependency: A theory of natural language understanding
    • Schank, R. Conceptual dependency: A theory of natural language understanding, Cognitive Science, 3: 4, 1972.
    • (1972) Cognitive Science , vol.3 , pp. 4
    • Schank, R.1
  • 288
    • 85054221583 scopus 로고
    • The use of conceptual structures to handle the inference problem
    • Shepherdstown, WV. North Holland: Amsterdam
    • Thuraisingham, B. The use of conceptual structures to handle the inference problem. In Proceedings of the IFIP Database Security Conference, Shepherdstown, WV. North Holland: Amsterdam, 1992.
    • (1992) Proceedings of the IFIP Database Security Conference
    • Thuraisingham, B.1
  • 291
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E. et al. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and Systems Security 2: 1, 1999.
    • (1999) ACM Transactions on Information and Systems Security , vol.2 , pp. 1
    • Bertino, E.1
  • 292
    • 85055483544 scopus 로고    scopus 로고
    • An approac h to deriving global authorizations in federated database systems
    • Chapman & Hall: London
    • Castano, S. et al. An approac h to deriving global authorizations in federated database systems. In Proceedings of the IFIP Database Security Conference, 1996. Chapman & Hall: London, 1997.
    • (1996) Proceedings of the IFIP Database Security Conference
    • Castano, S.1
  • 294
    • 77954107830 scopus 로고    scopus 로고
    • Secure database systems
    • Piattin, M. and Diaz, O., Eds., Artech, London, UK
    • Ferrari, E. and Thuraisingham, B. Secure database systems. In Advances in Database Management, Piattin, M. and Diaz, O., Eds., Artech, London, UK, 2000.
    • (2000) Advances in Database Management
    • Ferrari, E.1    Thuraisingham, B.2
  • 295
    • 85055543359 scopus 로고    scopus 로고
    • E-Commerce Security, Weak Links and Strong Defenses. Wiley: New York
    • Ghosh, A. E-Commerce Security, Weak Links and Strong Defenses. Wiley: New York, 1998.
    • (1998)
    • Ghosh, A.1
  • 296
    • 85055466776 scopus 로고
    • Integrating concurrency control and commit alg orithms in distributed multilevel secure databases
    • Huntsville, AL, 1993. North Holland: Amsterdam
    • Jajodia, S. et al. Integrating concurrency control and commit alg orithms in distributed multilevel secure databases. In Proceedings of the IFIP Database Security, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
    • (1994) Proceedings of the IFIP Database Security
    • Jajodia, S.1
  • 304
    • 85055510920 scopus 로고
    • Achieving a trusted database management system using parallelism
    • Kingston, Ontario, 1988. North Holland: Amsterdam
    • Froscher J. and Meadows, C. Achieving a trusted database management system using parallelism. In Proceedings of the IFIP Database Security Conference, Kingston, Ontario, 1988. North Holland: Amsterdam, 1989.
    • (1989) Proceedings of the IFIP Database Security Conference
    • Froscher, J.1    Meadows, C.2
  • 305
    • 85055466776 scopus 로고
    • Integrating concurrency control and commit alg orithms in distributed multilevel secure databases
    • Huntsville, AL, 1993. North Holland: Amsterdam
    • Jajodia, S. et al. Integrating concurrency control and commit alg orithms in distributed multilevel secure databases. In Proceedings of the IFIP Database Security, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
    • (1994) Proceedings of the IFIP Database Security
    • Jajodia, S.1
  • 306
    • 85055527288 scopus 로고
    • SDDM—A prototype of a distributed architecture for database security
    • Los Angeles, February
    • Jensen, C. SDDM—A prototype of a distributed architecture for database security. In Proceedings of the IEEE Data Engineering Conference, Los Angeles, February 1989.
    • (1989) Proceedings of the IEEE Data Engineering Conference
    • Jensen, C.1
  • 310
    • 85055571326 scopus 로고
    • Design and implementation of a distributed query processor for a trusted distributed database management systems
    • April
    • Thuraisingham, B. and Rubinovitz, H. Design and implementation of a distributed query processor for a trusted distributed database management systems. Journal of Systems and Software, April 1993.
    • (1993) Journal of Systems and Software
    • Thuraisingham, B.1    Rubinovitz, H.2
  • 312
    • 0026403732 scopus 로고
    • Multilevel security issues in distributed database management systems—II
    • Thuraisingham, B. Multilevel security issues in distributed database management systems—II. Computers and Security Journal 10: 6, 1991.
    • (1991) Computers and Security Journal , vol.10 , pp. 6
    • Thuraisingham, B.1
  • 313
    • 85055572301 scopus 로고
    • Multilevel security for distributed database management system—III
    • Thuraisingham, B. and Rubinovitz, H. Multilevel security for distributed database management system—III, Computers and Security, 10: 5, 1992.
    • (1992) Computers and Security , vol.10 , pp. 5
    • Thuraisingham, B.1    Rubinovitz, H.2
  • 314
    • 0027871109 scopus 로고    scopus 로고
    • Design and implementation of a distributed database inference controller
    • Phoenix, AZ, October
    • Thuraisingham, B. et al. Design and implementation of a distributed database inference controller. In Proceedings of the IEEE COMPSAC Conference, Phoenix, AZ, October 1993.
    • Proceedings of the IEEE COMPSAC Conference , pp. 1993
    • Thuraisingham, B.1
  • 315
    • 0028730609 scopus 로고
    • Security issues for federated database systems
    • Thuraisingham, B. Security issues for federated database systems, Computers and Security, 13: 6, 1994.
    • (1994) Computers and Security , vol.13 , pp. 6
    • Thuraisingham, B.1
  • 317
    • 85055526675 scopus 로고    scopus 로고
    • Evolvable systems initiative for real-time command and control systems
    • Orlando, FL, November
    • Bensley, E. et al. Evolvable systems initiative for real-time command and control systems. In Proceedings of the First IEEE Complex Systems Conference, Orlando, FL, November 1995.
    • Proceedings of the First IEEE Complex Systems Conference , pp. 1995
    • Bensley, E.1
  • 321
    • 85055466776 scopus 로고
    • Integrating concurrency control and commit alg orithms in distributed multilevel secure databases
    • Huntsville, AL, 1993. North Holland: Amsterdam
    • Jajodia, S. et al. Integrating concurrency control and commit alg orithms in distributed multilevel secure databases. In Proceedings of the IFIP Database Security, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
    • (1994) Proceedings of the IFIP Database Security
    • Jajodia, S.1
  • 322
    • 85055552256 scopus 로고
    • Integrity constraints in federated databases
    • Como, Italy, 1996. Chapman & Hall: London
    • Olivier, M. Integrity constraints in federated databases. In Proceedings of the IFIP Database Security Conference, Como, Italy, 1996. Chapman & Hall: London, 1992.
    • (1992) Proceedings of the IFIP Database Security Conference
    • Olivier, M.1
  • 323
    • 0026403732 scopus 로고
    • Multilevel security issues in distributed database management systems—II
    • Thuraisingham, B. Multilevel security issues in distributed database management systems—II. Computers and Security Journal 10: 6, 1991.
    • (1991) Computers and Security Journal , vol.10 , pp. 6
    • Thuraisingham, B.1
  • 324
    • 0342296051 scopus 로고
    • Multilevel security issues for distributed database management systems—III
    • Thuraisingham, B. and Rubinovitz, H. Multilevel security issues for distributed database management systems—III. Computers and Security 11: 5, 1992.
    • (1992) Computers and Security , vol.11 , pp. 5
    • Thuraisingham, B.1    Rubinovitz, H.2
  • 326
    • 0028730609 scopus 로고
    • Security issues for federated database systems
    • Thuraisingham, B. Security issues for federated database systems. Computers and Security 13: 6, 1994.
    • (1994) Computers and Security , vol.13 , pp. 6
    • Thuraisingham, B.1
  • 329
    • 85055573603 scopus 로고    scopus 로고
    • Extending the ODMG object model with composite objects
    • Vancouver, British Columbia, Canada
    • Bertino, E. and Guerrini, G. Extending the ODMG object model with composite objects. Proceedings of the ACM OOPSLA Conference, Vancouver, British Columbia, Canada, 1998.
    • (1998) Proceedings of the ACM OOPSLA Conference
    • Bertino, E.1    Guerrini, G.2
  • 330
    • 85055552654 scopus 로고    scopus 로고
    • Role-based security in a distributed resource environment
    • Amsterdam, The Netherlands, August
    • Demurjian, S. et al. Role-based security in a distributed resource environment. In Proceedings of the IFIP Database Security Conference, Amsterdam, The Netherlands, August 2000.
    • (2000) Proceedings of the IFIP Database Security Conference
    • Demurjian, S.1
  • 331
  • 332
    • 0025065897 scopus 로고
    • Integrating an object-oriented data model with multilevel security
    • Oakland, CA, May
    • Jajodia, S. and Kogan, B. Integrating an object-oriented data model with multilevel security. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1990
    • (1990) IEEE Symposium on Security and Privacy
    • Jajodia, S.1    Kogan, B.2
  • 334
    • 85055526225 scopus 로고
    • SODA—A secure object-oriented database system
    • Keefe, T. et al. SODA—A secure object-oriented database system. Computers and Security 9: 5, 1989.
    • (1989) Computers and Security , vol.9 , pp. 5
    • Keefe, T.1
  • 336
    • 85055532938 scopus 로고
    • A security model for multilevel objects with bidirectional relationships
    • Halifax, UK, 1990. North Holland: Amsterdam
    • Morgenstern, M. A security model for multilevel objects with bidirectional relationships. In Proceedings of the IFIP Database Security Conference, Halifax, UK, 1990. North Holland: Amsterdam, 1991.
    • (1991) Proceedings of the IFIP Database Security Conference
    • Morgenstern, M.1
  • 338
    • 0026119329 scopus 로고
    • A model of authorization for next-generation database systems
    • Rabitti, F. et al. A model of authorization for next-generation database systems. ACM Transactions on Database Systems 16: 1, 1991.
    • (1991) ACM Transactions on Database Systems , vol.16 , pp. 1
    • Rabitti, F.1
  • 339
    • 85055594243 scopus 로고
    • Security for object-oriented systems
    • Hildesheim, Germany 1994. North Holland: Amsterdam
    • Rosenthal, A. et al. Security for object-oriented systems. In Proceedings of the Database Security Conference, Hildesheim, Germany 1994. North Holland: Amsterdam, 1995.
    • (1995) Proceedings of the Database Security Conference
    • Rosenthal, A.1
  • 342
    • 84918659225 scopus 로고
    • An object-oriented approac h for designing secure systems
    • Thuraisingham, B. and Chase, F. An object-oriented approac h for designing secure systems. IEEE CIPHER, 1989.
    • (1989) IEEE CIPHER
    • Thuraisingham, B.1    Chase, F.2
  • 344
    • 85055580885 scopus 로고
    • June, Technical Report, MTP-291 (also presented at the Object Systems Security Workshop, Karlsruhe, Germany, April 1990)
    • Thuraisingham, B. Mathematical formalisms for multilevel object-oriented systems, June 1990, Technical Report, MTP-291 (also presented at the Object Systems Security Workshop, Karlsruhe, Germany, April 1990).
    • (1990) Mathematical Formalisms for Multilevel Object-Oriented Systems
    • Thuraisingham, B.1
  • 345
    • 84914789679 scopus 로고
    • Multilevel secure object-oriented data model—Issues on noncomposite objects, composite objects, and versioning
    • Thuraisingham, B. Multilevel secure object-oriented data model—Issues on noncomposite objects, composite objects, and versioning. Journal of Object-Oriented Programming 4: 6 1991.
    • (1991) Journal of Object-Oriented Programming , vol.4 , pp. 6
    • Thuraisingham, B.1
  • 346
    • 0029328169 scopus 로고
    • Towards the design of a multilevel secure objectoriented database management system
    • Thuraisingham, B. Towards the design of a multilevel secure objectoriented database management system. Journal of Object-Oriented Programming 8: 3, 1995.
    • (1995) Journal of Object-Oriented Programming , vol.8 , pp. 3
    • Thuraisingham, B.1
  • 347
    • 0040527747 scopus 로고
    • Implementing set-oriented production rules as an extension to Starburst
    • Barcelona, Spain, August
    • Widom, J. et al. Implementing set-oriented production rules as an extension to Starburst. In Proceedings of the Very Large Database Conference, Barcelona, Spain, August 1991.
    • (1991) Proceedings of the Very Large Database Conference
    • Widom, J.1
  • 348
    • 85055551478 scopus 로고    scopus 로고
    • Available at http://www.samspublishing.com/articles/article.asp?p=21643.
  • 351
    • 85055585562 scopus 로고    scopus 로고
    • Java security
    • Java security. Available at http://java.sun.com/security/.
  • 352
    • 85055529571 scopus 로고    scopus 로고
    • MOMT: A multilevel object modeling technique for designing secure database applications
    • Marks, D. et al. MOMT: A multilevel object modeling technique for designing secure database applications. Journal of Object-Oriented Programming 8: 3, 1996.
    • (1996) Journal of Object-Oriented Programming , vol.8 , pp. 3
    • Marks, D.1
  • 353
    • 85055539241 scopus 로고    scopus 로고
    • Available at http://www.omg.org/technology/documents/formal/omg_security.htm.
  • 354
    • 85055577091 scopus 로고    scopus 로고
    • Using parameterized UML to specify and compose access control models
    • Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA
    • Ray, I. et al. Using parameterized UML to specify and compose access control models. In Proceedings of the IFIP Integrity and Control Conference, Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA, 2003.
    • (2003) Proceedings of the IFIP Integrity and Control Conference
    • Ray, I.1
  • 356
    • 0028055452 scopus 로고
    • Applying OMT for designing multilevel database applications
    • Huntsville, AL, September 1993. North Holland: Amsterdam
    • Sell, P. and Thuraisingham, B. Applying OMT for designing multilevel database applications. In Proceedings of the IFIP Database Security Conference, Huntsville, AL, September 1993. North Holland: Amsterdam, 1994.
    • (1994) Proceedings of the IFIP Database Security Conference
    • Sell, P.1    Thuraisingham, B.2
  • 359
    • 85055482964 scopus 로고    scopus 로고
    • Wijesekera, D. Available at http://www.isse.gmu.edu/dumindaclasses/spring02/umlSecurity3.ppt.
    • Wijesekera, D.1
  • 360
    • 80052057722 scopus 로고    scopus 로고
    • Uniform indexing for geospatial data and authorizations
    • July, Cambridge, UK, 2002. Kluwer: Hingham, MA
    • Atluri, V. and Mazzoleni, P. Uniform indexing for geospatial data and authorizations. In Proceedings of the IFIP Database Security Conference, July, Cambridge, UK, 2002. Kluwer: Hingham, MA, 2003.
    • (2003) Proceedings of the IFIP Database Security Conference
    • Atluri, V.1    Mazzoleni, P.2
  • 361
    • 48249083391 scopus 로고    scopus 로고
    • An index structure for efficient evaluation of spatiotemporal authorizations
    • Sitges, Spain. Kluwer: Hingham, MA, July
    • Atluri, V. and Guo, Q. Star-tree: An index structure for efficient evaluation of spatiotemporal authorizations. In Proceedings of the IFIP Database Security Conference, Sitges, Spain. Kluwer: Hingham, MA, July 2004.
    • (2004) Proceedings of the IFIP Database Security Conference
    • Atluri, V.1    Guo, Q.S.-T.2
  • 362
    • 84904259119 scopus 로고    scopus 로고
    • Protecting privacy from continuous highresolution satellite surveillance
    • Amsterdam, The Netherlands, August 2000. Kluwer: Hingham, MA
    • Chun, S. and Atluri, V. Protecting privacy from continuous highresolution satellite surveillance. In Proceedings of the IFIP Database Security Conference, Amsterdam, The Netherlands, August 2000. Kluwer: Hingham, MA, 2001.
    • (2001) Proceedings of the IFIP Database Security Conference
    • Chun, S.1    Atluri, V.2
  • 363
    • 77954107830 scopus 로고    scopus 로고
    • Secure database systems
    • Piatinni, M. and Diaz, O., Eds. Artech: London, UK
    • Ferrari, E. and Thuraisingham, B. Secure database systems. In Advances in Database Management, Piatinni, M. and Diaz, O., Eds. Artech: London, UK, 2000.
    • (2000) Advances in Database Management
    • Ferrari, E.1    Thuraisingham, B.2
  • 364
    • 85055486385 scopus 로고
    • Multilevel security for multimedia systems
    • Halifax, England, Se ptember 1990 (also published as book c hapter by North Holland
    • Thuraisingham, B. Multilevel security for multimedia systems. In Proceedings of the Fourth IFIP WG 11.3 Conference on Database Security, Halifax, England, Se ptember 1990 (also published as book c hapter by North Holland, 1991).
    • (1991) Proceedings of the Fourth IFIP WG 11.3 Conference on Database Security
    • Thuraisingham, B.1
  • 366
    • 0029207994 scopus 로고
    • Multilevel security in infor mation retrieval systems— II
    • Thuraisingham, B. Multilevel security in infor mation retrieval systems— II. Information and Management Journal 26, 1995.
    • (1995) Information and Management Journal , vol.26
    • Thuraisingham, B.1
  • 371
    • 0027334758 scopus 로고
    • Parallel processing and tr usted database management systems
    • Indianapolis, IN, February
    • Thuraisingham, B. Parallel processing and tr usted database management systems. In Proceedings of the ACM Computer Science Conference, Indianapolis, IN, February 1993.
    • (1993) Proceedings of the ACM Computer Science Conference
    • Thuraisingham, B.1
  • 372
    • 0028730609 scopus 로고
    • Security issues for federated database systems
    • Thuraisingham, B. Security issues for federated database systems. Computers and Security 13: 6, 1994.
    • (1994) Computers and Security , vol.13 , pp. 6
    • Thuraisingham, B.1
  • 374
    • 84902520540 scopus 로고    scopus 로고
    • Grand challenges in data integrity and quality: Panel discussion
    • Lausanne, Switzerland, 2003. Kluwer: Hingham, MA
    • Thuraisingham, B. Grand challenges in data integrity and quality: Panel discussion. In Proceedings of the IFIP Database Integrity Conference, Lausanne, Switzerland, 2003. Kluwer: Hingham, MA, 2004.
    • (2004) Proceedings of the IFIP Database Integrity Conference
    • Thuraisingham, B.1
  • 378
    • 0033336136 scopus 로고    scopus 로고
    • Distributed data mining in credit card fraud detection
    • Chan, P. et al. Distributed data mining in credit card fraud detection. IEEE Intelligent Systems 14: 6, 1999.
    • (1999) IEEE Intelligent Systems , vol.14 , pp. 6
    • Chan, P.1
  • 379
    • 85055593638 scopus 로고    scopus 로고
    • Kdnuggets
    • Available at Kdnuggets, www.kdnuggets.com.
  • 380
    • 84985909197 scopus 로고    scopus 로고
    • Data mining for computer security applications, tutorial
    • Melbourne, FL
    • Lazarevic, A. et al. Data mining for computer security applications, tutorial. In Proceedings of the IEEE Data Mining Conference, Melbourne, FL, 2003.
    • (2003) Proceedings of the IEEE Data Mining Conference
    • Lazarevic, A.1
  • 384
    • 33745441630 scopus 로고    scopus 로고
    • Ed. H. Kargupta et al. AAAI Press: Cambridge, MA
    • Data Mining for Counter-Terrorism, Next Generation Data Mining. Ed. H. Kargupta et al. AAAI Press: Cambridge, MA, 2004.
    • (2004) Next Generation Data Mining
  • 389
  • 390
    • 0034497773 scopus 로고    scopus 로고
    • Using sample size to limit exposure to data mining
    • Clifton, C. Using sample size to limit exposure to data mining. Journal of Computer Security 8: 4, 2000.
    • (2000) Journal of Computer Security , vol.8 , pp. 4
    • Clifton, C.1
  • 392
    • 10044273842 scopus 로고    scopus 로고
    • Tools for privacy preserving distributed data mining
    • Clifton, C. et al. Tools for privacy preserving distributed data mining. SIGKDD Explorations, 4: 2, 2003.
    • (2003) SIGKDD Explorations , vol.4 , pp. 2
    • Clifton, C.1
  • 394
    • 10044250804 scopus 로고    scopus 로고
    • Research problems in data stream processing and pri vacypreserving data mining
    • Baltimore, November
    • Gehrke, J. Research problems in data stream processing and pri vacypreserving data mining. In Proceedings of the Next Generation Data Mining Workshop, Baltimore, November 2002.
    • (2002) Proceedings of the Next Generation Data Mining Workshop
    • Gehrke, J.1
  • 396
    • 10444240638 scopus 로고    scopus 로고
    • Privacy sensitive distributed data mining from multiparty data
    • Tucson, AZ, June
    • Kargupta, H. et al. Privacy sensitive distributed data mining from multiparty data. In Proceedings of the Security Informatics Symposium, Tucson, AZ, June 2003.
    • (2003) Proceedings of the Security Informatics Symposium
    • Kargupta, H.1
  • 397
    • 85055478436 scopus 로고    scopus 로고
    • Privacy preserving clustering with distributed EM mixture modeling. Purdue University Report, 2003 (submitted for publication)
    • Lin, A. et al. Privacy preserving clustering with distributed EM mixture modeling. Purdue University Report, 2003 (submitted for publication).
    • Lin, A.1
  • 400
    • 0242698173 scopus 로고    scopus 로고
    • Datafly: A system for providing anonymity in medical data
    • Lake Tahoe, CA, August 1997. Chapman & Hall: London
    • Sweeney, L. Datafly: A system for providing anonymity in medical data. In Proceedings of the IFIP Database Security Conference, Lake Tahoe, CA, August 1997. Chapman & Hall: London, 1998.
    • (1998) Proceedings of the IFIP Database Security Conference
    • Sweeney, L.1
  • 401
    • 84995288300 scopus 로고    scopus 로고
    • Navigating computer science research through waves of privacy concerns: Discussions among computer scientists at Carnegie Mellon University
    • Sweeney, L. Navigating computer science research through waves of privacy concerns: Discussions among computer scientists at Carnegie Mellon University. ACM Computers and Society, 2004
    • (2004) ACM Computers and Society
    • Sweeney, L.1
  • 406
    • 10444271317 scopus 로고    scopus 로고
    • Data mining, national security, privacy and civil liberties
    • Thuraisingham, B. Data mining, national security, privacy and civil liberties. SIGKDD Explorations, 4: 2, 2003.
    • (2003) SIGKDD Explorations , vol.4 , pp. 2
    • Thuraisingham, B.1
  • 407
    • 84899169166 scopus 로고    scopus 로고
    • Privacy preserving data mining: Developments and directions
    • Thuraisingham, B. Privacy preserving data mining: Developments and directions, Journal of Database Management 2004 (to appear).
    • (2004) Journal of Database Management
    • Thuraisingham, B.1
  • 408
    • 24644455920 scopus 로고    scopus 로고
    • Privacy constraint processing in a privacy enhanced database system
    • Thuraisingham, B. Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal 2005 (to appear).
    • (2005) Data and Knowledge Engineering Journal
    • Thuraisingham, B.1
  • 409
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving K-means clustering over vertically partitioned data
    • Washington, DC
    • Vaidya, J. and Clifton, C. Privacy-preserving K-means clustering over vertically partitioned data. In Proceedings ACM SIGKDD, Washington, DC, 2003.
    • (2003) Proceedings ACM SIGKDD
    • Vaidya, J.1    Clifton, C.2
  • 416
    • 85055514027 scopus 로고    scopus 로고
    • National Academy of Sciences Study Report: Protecting Children from Inappropriate Content on the Inter net. National Academy Press: Washington, DC
    • National Academy of Sciences Study Report: Protecting Children from Inappropriate Content on the Inter net. National Academy Press: Washington, DC, 2002.
    • (2002)
  • 417
    • 85055570986 scopus 로고    scopus 로고
    • The National Science Foundation
    • The National Science Foundation. Available at www.nsf.gov.
  • 423
    • 85051789757 scopus 로고    scopus 로고
    • Managing threats to Web databases and cyber systems: Issues, solutions and challenges
    • Ed., V. Kumar et al. Kluwer: Hingham, MA
    • Thuraisingham, B. Managing threats to Web databases and cyber systems: Issues, solutions and challenges. In Cyber Security: Threats and Solutions, Ed., V. Kumar et al. Kluwer: Hingham, MA, 2005.
    • (2005) Cyber Security: Threats and Solutions
    • Thuraisingham, B.1
  • 424
    • 24644455920 scopus 로고    scopus 로고
    • Privacy constraint processing in a privacy enhanced database system
    • Thuraisingham, B. Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal, 2005 (to appear).
    • (2005) Data and Knowledge Engineering Journal
    • Thuraisingham, B.1
  • 426
    • 85055568164 scopus 로고    scopus 로고
    • Cyber infrastr ucture. NSF Report
    • Atkins, D. et al. Cyber infrastr ucture. NSF Report. Available at http://www.communitytechnology.org/nsf_ci_report/.
    • Atkins, D.1
  • 427
  • 435
    • 10044250804 scopus 로고    scopus 로고
    • Research problems in data stream processing and pri vacypreserving data mining
    • Baltimore, November
    • Gehrke, J. Research problems in data stream processing and pri vacypreserving data mining. In Proceedings of the Next Generation Data Mining Workshop, Baltimore, November 2002.
    • (2002) Proceedings of the Next Generation Data Mining Workshop
    • Gehrke, J.1
  • 437
    • 84858540250 scopus 로고    scopus 로고
    • Performance-conscious key management in encrypted databases
    • Sitges, Spain, Eds. C. Farkas and P. Samarati. Kluwer: Hingham, MA, July
    • Hacigumus, H. and Mehrotra, S. Performance-conscious key management in encrypted databases. In Proceedings of the IFIP Database Security Conference, Sitges, Spain, Eds. C. Farkas and P. Samarati. Kluwer: Hingham, MA, July 2004.
    • (2004) Proceedings of the IFIP Database Security Conference
    • Hacigumus, H.1    Mehrotra, S.2
  • 438
    • 79551602978 scopus 로고    scopus 로고
    • The semantic Web. Scientific American, May
    • Berners Lee, T. et al. The semantic Web. Scientific American, May 2001.
    • (2001)
    • Berners Lee, T.1
  • 439
    • 85055466016 scopus 로고    scopus 로고
    • RDF Primer
    • RDF Primer. Available at http://www.w3.org/TR/rdf-primer/.
  • 442
    • 0027853601 scopus 로고
    • Design and implementation of a database inference controller
    • Thuraisingham, B. et al. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
    • (1993) Data and Knowledge Engineering Journal , vol.11 , pp. 3
    • Thuraisingham, B.1
  • 443
    • 0028730609 scopus 로고
    • Security issues for federated database systems
    • Thuraisingham, B. Security issues for federated database systems. Computers and Security 13: 6, 1994.
    • (1994) Computers and Security , vol.13 , pp. 6
    • Thuraisingham, B.1
  • 445
    • 0036386924 scopus 로고    scopus 로고
    • Data and applications security: Developments and directions
    • Oxford, UK
    • Thuraisingham, B. Data and applications security: Developments and directions. In Proceedings of IEEE COMPSAC, Oxford, UK, 2002.
    • (2002) Proceedings of IEEE COMPSAC
    • Thuraisingham, B.1
  • 447
    • 10444271317 scopus 로고    scopus 로고
    • Data mining, national security pri vacy, and civil liberties
    • Thuraisingham, B. Data mining, national security pri vacy, and civil liberties, ACM SIGKDD, 4: 2, 2003.
    • (2003) ACM SIGKDD , vol.4 , pp. 2
    • Thuraisingham, B.1
  • 449
    • 24644455920 scopus 로고    scopus 로고
    • Privacy constraint processing in a privacy enhanced database system
    • Thuraisingham, B. Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal, 2005 (to appear).
    • (2005) Data and Knowledge Engineering Journal
    • Thuraisingham, B.1
  • 450
    • 85055538702 scopus 로고    scopus 로고
    • Available at www.w3c.org.
  • 451
    • 85055591189 scopus 로고    scopus 로고
    • Available at http://xml.apache.org/security/.
  • 452
    • 85055553106 scopus 로고    scopus 로고
    • Available at http://www.w3.org/Signature/.
  • 455
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E. et al. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and Systems Security 2: 1, 1999.
    • (1999) ACM Transactions on Information and Systems Security , vol.2 , pp. 1
    • Bertino, E.1
  • 458
    • 85055583804 scopus 로고    scopus 로고
    • Digital rights management architectures
    • Digital rights management architectures. Available at http://www.dlib.org/dlib/june01/iannella/06iannella.html.
  • 461
    • 85055482745 scopus 로고    scopus 로고
    • Analyzing the safety of workflow authorization models
    • Chalidiki, Greece, July 1998. Kluwer: Hingham, MA
    • Huang, W. and Atluri, V. Analyzing the safety of workflow authorization models. In Proceedings of the IFIP Database Security Conference, Chalidiki, Greece, July 1998. Kluwer: Hingham, MA, 1999.
    • (1999) Proceedings of the IFIP Database Security Conference
    • Huang, W.1    Atluri, V.2
  • 462
    • 0007909408 scopus 로고    scopus 로고
    • Knowledge management architecture
    • Ed. B. Thuraisingham, Auerbach: New York
    • Morey, D. Knowledge management architecture. In Handbook of Data Management, Ed. B. Thuraisingham, Auerbach: New York, 1998.
    • (1998) Handbook of Data Management
    • Morey, D.1
  • 465
    • 1642601787 scopus 로고    scopus 로고
    • A fair-exchange E-commerce protocol with automated dispute resolution
    • Amsterdam, The Netherlands, August
    • Ray, I. et al. A fair-exchange E-commerce protocol with automated dispute resolution. In Proceedings of the IFIP Database Security Conference, Amsterdam, The Netherlands, August 2000.
    • (2000) Proceedings of the IFIP Database Security Conference
    • Ray, I.1
  • 468
    • 85055558492 scopus 로고    scopus 로고
    • Object-oriented approac h to developing real-time infrastructure and data manager
    • Laguna Beach, CA, February
    • Bensley, E. et al. Object-oriented approac h to developing real-time infrastructure and data manager. In Proceedings of the IEEE Workshop on Object-Oriented Real-time Systems, Laguna Beach, CA, February 1996.
    • (1996) Proceedings of the IEEE Workshop on Object-Oriented Real-Time Systems
    • Bensley, E.1
  • 469
    • 0030169905 scopus 로고    scopus 로고
    • Robust distributed computing and sensing algorithm
    • Brooks, R. and Iyengar, S.S. Robust distributed computing and sensing algorithm. IEEE Computer 29: 6, 1996.
    • (1996) IEEE Computer , vol.29 , pp. 6
    • Brooks, R.1    Iyengar, S.S.2
  • 471
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Chan, H. and Perrig, A. Security and privacy in sensor networks. IEEE Computer 36: 10, 2003.
    • (2003) IEEE Computer , vol.36 , pp. 10
    • Chan, H.1    Perrig, A.2
  • 472
    • 0035278354 scopus 로고    scopus 로고
    • Scheduling and priority mapping for static real-time middleware
    • DiPippo, L. et al. Scheduling and priority mapping for static real-time middleware. Real-time Systems Journal 20: 2, 2001.
    • (2001) Real-Time Systems Journal , vol.20 , pp. 2
    • Dipippo, L.1
  • 474
    • 85055518631 scopus 로고    scopus 로고
    • MIT Total Data Quality Management Program
    • MIT Total Data Quality Management Program. Available at http://web.mit.edu/tdqm/www/index.shtml.
  • 475
    • 77954107830 scopus 로고    scopus 로고
    • Secure database systems
    • Ed. M. Piatini and O. Diaz. Artech: London, UK
    • Ferrari, E. and Thuraisingham, B. Secure database systems. In Advances in Database Management, Ed. M. Piatini and O. Diaz. Artech: London, UK, 2000.
    • (2000) Advances in Database Management
    • Ferrari, E.1    Thuraisingham, B.2
  • 477
    • 2542538052 scopus 로고    scopus 로고
    • Special issue on data mining and privacy
    • Gehrke, J. Special issue on data mining and privacy. SIGKDD Explorations, 4: 2, 2003.
    • (2003) SIGKDD Explorations , vol.4 , pp. 2
    • Gehrke, J.1
  • 481
    • 85055527773 scopus 로고    scopus 로고
    • An adaptive policy for improved timeliness in secure database systems
    • Rensselaerville, New York, August 1995. Chapman & Hall: London
    • Son, S. et al. An adaptive policy for improved timeliness in secure database systems. In Proceedings of the Ninth IFIP Working Conference in Database Security, Rensselaerville, New York, August 1995. Chapman & Hall: London, 1996.
    • (1996) Proceedings of the Ninth IFIP Working Conference in Database Security
    • Son, S.1
  • 482
    • 1542595336 scopus 로고    scopus 로고
    • STREAM: The Stanford stream data manager
    • Stanford Sensor Data Management Group. STREAM: The Stanford stream data manager. IEEE Data Engineering Bulletin 26: 1, 2003.
    • (2003) IEEE Data Engineering Bulletin , vol.26 , pp. 1
  • 485
    • 0036386924 scopus 로고    scopus 로고
    • Data and applications security: Developments and directions
    • Oxford, UK, August
    • Thuraisingham, B. Data and applications security: Developments and directions. In Proceedings of the IEEE COMPSAC Conference, Oxford, UK, August 2002.
    • (2002) Proceedings of the IEEE COMPSAC Conference
    • Thuraisingham, B.1
  • 486
    • 10444271317 scopus 로고    scopus 로고
    • Data mining, national security, privacy and civil liberties
    • Thuraisingham, B. Data mining, national security, privacy and civil liberties. SIGKDD Explorations, 4: 2, 2003.
    • (2003) SIGKDD Explorations , vol.4 , pp. 2
    • Thuraisingham, B.1
  • 489
    • 85055587299 scopus 로고    scopus 로고
    • Security and privacy for sensor databases
    • Thuraisingham, B. Security and privacy for sensor databases. Sensor Letters, 2: 1, 2004.
    • (2004) Sensor Letters , vol.2 , pp. 1
    • Thuraisingham, B.1
  • 491
    • 77954107830 scopus 로고    scopus 로고
    • Secure database systems
    • Eds. Piatini, O. and Diaz, O. Artech: London, UK
    • Ferrari, E. and Thuraisingham, B. Secure database systems. In Advances in Databases, Eds. Piatini, O. and Diaz, O. Artech: London, UK, 2000.
    • (2000) Advances in Databases
    • Ferrari, E.1    Thuraisingham, B.2
  • 492
    • 85008002483 scopus 로고    scopus 로고
    • IEEE Spectrum, 41: 7, 2004.
    • (2004) IEEE Spectrum , vol.41 , Issue.7
  • 494
    • 14344259059 scopus 로고    scopus 로고
    • Energ y and rate based MAC protocol for wireless sensor networks
    • Kannan, R. et al. Energ y and rate based MAC protocol for wireless sensor networks. ACM SIGMOD Record 32: 4, 2003.
    • (2003) ACM SIGMOD Record , vol.32 , pp. 4
    • Kannan, R.1
  • 495
  • 496
    • 85055532478 scopus 로고    scopus 로고
    • Security issues in mobile database access
    • Chalkidiki, Greece, July 1998. Kluwer: Hingham, MA
    • Lubinski, A. Security issues in mobile database access. In Proceedings of the IFIP Database Security Conference, Chalkidiki, Greece, July 1998. Kluwer: Hingham, MA, 1999.
    • (1999) Proceedings of the IFIP Database Security Conference
    • Lubinski, A.1
  • 498
    • 85055547421 scopus 로고    scopus 로고
    • Security in wireless sensor netw orks
    • Perrig, A. et al. Security in wireless sensor netw orks. Communications of the ACM, 47: 6, 2004.
    • (2004) Communications of the ACM , vol.47 , pp. 6
    • Perrig, A.1
  • 499
    • 0028730609 scopus 로고
    • Security issues for federated database systems
    • Thuraisingham, B. Security issues for federated database systems, Computers and Security, 13: 6, 1994.
    • (1994) Computers and Security , vol.13 , pp. 6
    • Thuraisingham, B.1
  • 502
    • 85055587299 scopus 로고    scopus 로고
    • Security and privacy for sensor databases
    • Thuraisingham, B. Security and privacy for sensor databases. Sensor Letters, 1: 2, 2004.
    • (2004) Sensor Letters , vol.1 , pp. 2
    • Thuraisingham, B.1
  • 504
    • 85055471689 scopus 로고    scopus 로고
    • Biometrics
    • Biometrics. Available at http://biometrics.cse.msu.edu/info.html.
  • 505
    • 0033336136 scopus 로고    scopus 로고
    • Distributed data mining in credit card fraud detection
    • Chan, P. et al. Distributed data mining in credit card fraud detection. IEEE Intelligent Systems 14: 6, 1999.
    • (1999) IEEE Intelligent Systems , vol.14 , pp. 6
    • Chan, P.1
  • 507
    • 85055539526 scopus 로고    scopus 로고
    • Digital forensic
    • Digital forensics. Available at http://www.forensics.nl/links/.
  • 508
    • 85055541729 scopus 로고    scopus 로고
    • Digital identity
    • Digital identity. Available at http://www.pingidentity.com/index.php?cid=whyfederate.
  • 509
    • 85055541038 scopus 로고    scopus 로고
    • Digital watermarking
    • Digital watermarking. Available at http://www.watermarkingworld.org/.
  • 510
    • 85055569902 scopus 로고    scopus 로고
    • Available at http://www.sims.berkeley.edu/resources/affiliates/workshops/econsecurity/.
  • 512
    • 85055569855 scopus 로고    scopus 로고
    • Identity theft
    • Identity theft. Available at http://www.identitytheft911.com/index.jsp.
  • 517
    • 85055573977 scopus 로고    scopus 로고
    • Available at http://www.security-risk-analysis.com/.
  • 519
    • 85055503439 scopus 로고    scopus 로고
    • Steganography
    • Steganography. Available at http://www.jjtc.com/Steganography/.
  • 521
    • 85055522378 scopus 로고
    • Special issue on heterogeneous database systems
    • Special issue on heterogeneous database systems. ACM Computing Surveys, 22: 3, 1990.
    • (1990) ACM Computing Surveys , vol.22 , pp. 3
  • 523
    • 0014797273 scopus 로고
    • A relational model of data for large shared data banks
    • Codd, E.F. A relational model of data for large shared data banks. Communications of the ACM 13: 6 (June) 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.6
    • Codd, E.F.1
  • 524
    • 0004154170 scopus 로고    scopus 로고
    • Addison- Wesley: Reading, MA, 1990 (6th edition published in 1995 b y Addison- Wesley)
    • Date, C.J. An Introduction to Database Management Systems. Addison- Wesley: Reading, MA, 1990 (6th edition published in 1995 b y Addison- Wesley).
    • An Introduction to Database Management Systems
    • Date, C.J.1
  • 527
    • 85055576383 scopus 로고
    • Next generation database systems
    • Next generation database systems. ACM SIGMOD Record, 19: 4, 1990.
    • (1990) ACM SIGMOD Record , vol.19 , pp. 4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.