Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
Introduction to “feature analysis of generalized data base management systems”
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
ACM SIGMOD Record - Directions for future database research & development
A hierarchical single-key-lock access control using the Chinese remainder theorem
SAC '92 Proceedings of the 1992 ACM/SIGAPP Symposium on Applied computing: technological challenges of the 1990's
A transformational grammar-based query processor for access control in a planning system
ACM Transactions on Database Systems (TODS)
Space saving key-lock access control system (abstract only)
CSC '87 Proceedings of the 15th annual conference on Computer Science
A Comparison of the Relational and CODASYL Approaches to Data-Base Management
ACM Computing Surveys (CSUR)
Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Intentional resolution of privacy protection in database systems
Communications of the ACM
An authorization model for a shared data base
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
ISC '01 Proceedings of the 4th International Conference on Information Security
Some security principles and their application to computer security
ACM SIGOPS Operating Systems Review
Possibility theory: As a means for modeling computer security and protection
MVL '78 Proceedings of the eighth international symposium on Multiple-valued logic
ACM '73 Proceedings of the ACM annual conference
The extended access matrix model of computer security
ACM SIGSOFT Software Engineering Notes - Proceedings of VERkshop III -- a formal verification workshop
ACM SIGMIS Database
The Journal of Strategic Information Systems
A Kernel design for a secure data base management system
VLDB '77 Proceedings of the third international conference on Very large data bases - Volume 3
Information protection by method base systems
VLDB '78 Proceedings of the fourth international conference on Very Large Data Bases - Volume 4
A semantic model for data base protection languages
VLDB '76 Proceedings of the second international conference on Systems for Large Data Bases
Worst-case costs for dynamic data element security decisions
ACM '74 Proceedings of the 1974 annual ACM conference - Volume 2
ACCNET: a corporate computer network
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Integrity aspects of a shared data base
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
A file protection system based on a trapdoor one-way hash function
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Hi-index | 48.23 |
The security of an information system may be represented by a model matrix whose elements are decision rules and whose row and column indices are users and data items respectively. A set of four functions is used to access this matrix at translation and execution time. Distinguishing between data dependent and data independent decision rules enables one to perform much of the checking of security only once at translation time rather than repeatedly at execution time. The model is used to explain security features of several existing systems, and serves as a framework for a proposal for general security system implementation within today's languages and operating systems.