A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
An object-oriented database architecture for providing security in cyberspace
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
Security in cyberspace: a knowledge-based approach
Data & Knowledge Engineering
The design and implementation of INGRES
ACM Transactions on Database Systems (TODS)
The Integration of Security and Integrity Constraints in MOKUM
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Capability-Based Primitives for Access Control in Object-Oriented Systems
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Specifying Application-level Security in Workflow Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Security Moving from Database Systems to ERP Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Hi-index | 0.00 |
In this paper we compare two approaches for implementing Security and Privacy systems in Cyberspace: a structured approach, such as done in Mokum, where access is governed by structure (of the classes), and two principles: the epistemic and the ontologic principle. The second approach is based on the use of capabilities, such as provided by ERP systems.