The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
ACM Computing Surveys (CSUR)
A lattice model of secure information flow
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
Protection in operating systems
Communications of the ACM
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
An authorization model for a shared data base
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
ACM SIGOPS Operating Systems Review
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
A semantic model for data base protection languages
VLDB '76 Proceedings of the second international conference on Systems for Large Data Bases
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Views, authorization, and locking in a relational data base system
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Hi-index | 0.00 |
This paper surveys some aspects of data base security, with emphasis on basic priciples and ways to express security requirements, Security policies and theoretical models are considered in detail, and the models are used to compare the security features of some date base management systems.