Toward a multilevel secure relational data model
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
Bibliography on database security
ACM SIGMOD Record
Security in database systems: a research perspective
Computers and Security
The entity-relationship model—toward a unified view of data
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
Protection in operating systems
Communications of the ACM
Database Security and Integrity
Database Security and Integrity
A Model of Methods Access Authorization in Object-oriented Databases
VLDB '93 Proceedings of the 19th International Conference on Very Large Data Bases
A new Authorization Model for Object-Oriented Databases
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Security Constraint Processing in Multilevel Secure AMAC Schemata
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
ACM '76 Proceedings of the 1976 annual conference
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Case study: Securing knowledge in organizations: lessons from the defense and intelligence sectors
International Journal of Information Management: The Journal for Information Professionals
Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
Information Resources Management Journal
Hi-index | 0.00 |
To achieve a certain degree of information systems security different techniques have been proposed and implemented. It is the aim of this paper to form a basis for their evaluation and comparison. For this purpose a general framework of security is established by defining its scope, most common threats against the security, and two kinds of different comparison and evaluation criteria. The first criteria is a set of requirements on the secrecy and confidentiality of information while the second consists of several structural requirements which we believe are essential for a successful and powerful security technique. In our evaluation we include the Discretionary Models, the Mandatory Models, the Personal Knowledge Approach, the Chinese Wall Policy and the Clark and Wilson model of security.