Principles of database and knowledge-base systems, Vol. I
Principles of database and knowledge-base systems, Vol. I
Integrity versus security in multi-level secure databases
on Database Security: Status and Prospects
IEEE Transactions on Software Engineering
Control of confidentiality in databases
Computers and Security
Modeling Security-Relevant Data Semantics
IEEE Transactions on Software Engineering
A logic for reasoning about security
ACM Transactions on Computer Systems (TOCS)
Eliminating polyinstantiation securely
Computers and Security
Support for security modeling in information systems design
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
Tuple-level vs. element-level classification
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
On the axiomatization of security policy: some tentative observations about logic representation
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Cryptography and data security
Cryptography and data security
A Semantic Framework of the Multilevel Secure Relational Model
IEEE Transactions on Knowledge and Data Engineering
Entity Modeling in the MLS Relational Model
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
The Structure of Permissions: A Normative Framework for Access Rights
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Use of an Experimental Policy Workbench: Description and Preliminary Results
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Canonical Security Modeling for Federated Databases
Proceedings of the IFIP WG 2.6 Database Semantics Conference on Interoperable Database Systems (DS-5)
Inference Channel-Free Integrity Constraints in Multilevel Relational Databases
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
The Complexity and Composability of Secure Interoperation
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
The semantics and expressive power of the MLR data model
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Minimal data upgrading to prevent inference and association attacks
PODS '99 Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
A bitmap-based access control for restricted views of XML documents
Proceedings of the 2003 ACM workshop on XML security
Secure Interoperation in a Multidomain Environment Employing RBAC Policies
IEEE Transactions on Knowledge and Data Engineering
A systematic literature review of inference strategies
International Journal of Information and Computer Security
Grid supporting platform for AMS data processing
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Semantic access control model: a formal specification
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Hi-index | 0.00 |
We develop a formal framework of MAC policies in multilevel relational databases. We identify the important components of MAC policies and their desirable properties. The framework provides a basis for systematically specifying MAC policies and characterizing their potential mismatches. Based on the framework, we compare and unify the MAC policies and policy components that are proposed in the literature or imposed in existing systems. Our framework could be used to capture and resolve MAC policy mismatches in the trusted interoperation of heterogeneous multilevel relational databases.