Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Linear queries in statistical databases
ACM Transactions on Database Systems (TODS)
Concepts and capabilities of a database computer\
ACM Transactions on Database Systems (TODS)
A model of statistical database their security
ACM Transactions on Database Systems (TODS)
Concurrent Programming Concepts
ACM Computing Surveys (CSUR)
Multiprocessor Organization—a Survey
ACM Computing Surveys (CSUR)
Specification and verification of the UCLA Unix security kernel
Communications of the ACM
Communicating sequential processes
Communications of the ACM
A model for verification of data security in operating systems
Communications of the ACM
Distributed processes: a concurrent programming concept
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A high security log-in procedure
Communications of the ACM
Monitors: an operating system structuring concept
Communications of the ACM
A back-end computer for data base management
Communications of the ACM
The nucleus of a multiprogramming system
Communications of the ACM
A data base management system design philosophy
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
Operating system principles
A Semantic Model for Data Base Protection Languages
Systems for Large Data Bases
Full protection specifications in the semantic model for database protection languages
ACM '76 Proceedings of the 1976 annual conference
On the duality of operating system structures
ACM SIGOPS Operating Systems Review
An examination of a distributed architecture data security system and performance overhead costs.
An examination of a distributed architecture data security system and performance overhead costs.
Multiprocessor architectures for supporting secure database management.
Multiprocessor architectures for supporting secure database management.
ACM SIGPLAN Notices
An algorithm for resource location in a loosely linked distributed computer system
ACM SIGOPS Operating Systems Review
Hi-index | 0.00 |
This paper describes the configuration and intermodule communication of a MULTImodule system for supporting Secure Authorization with Full Enforcement (MULTISAFE) for database management. A modular architecture is described which provides secure, controlled access to shared data in a multiuser environment, with low performance penalties, even for complex protection policies. The primary mechanisms are structured and verifiable. The entire approach is immediately extendible to distributed protection of distributed data. The system includes a user and applications module (UAM), a data storage and retrieval module (SRM), and a protection and security module (PSM). The control of intermodule communication is based on a data abstraction approach, initially described in terms of function invocations. An implementation within a formal message system is then described. The discussion of function invocations begins with the single terminal case and extends to the multiterminal case. Some physical implementation aspects are also discussed, and some examples of message sequences are given.