The design and implementation of INGRES
ACM Transactions on Database Systems (TODS)
Implementation of integrity constraints and views by query modification
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
Embedding a relational data sublanguage in a general purpose programming language
Proceedings of the 1976 conference on Data : Abstraction, definition and structure
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
A functional view of data independence
SIGFIDET '74 Proceedings of the 1974 ACM SIGFIDET (now SIGMOD) workshop on Data description, access and control
SEQUEL: A structured English query language
SIGFIDET '74 Proceedings of the 1974 ACM SIGFIDET (now SIGMOD) workshop on Data description, access and control
Retrospection on a database system
ACM Transactions on Database Systems (TODS)
The design and implementation of INGRES
ACM Transactions on Database Systems (TODS)
A Model for Evaluation and Administration of Security in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
A database approach for managing VLSI design data
DAC '82 Proceedings of the 19th Design Automation Conference
Specification of content-dependent security policies
ACM '83 Proceedings of the 1983 annual conference on Computers : Extending the human resource
Information systems security: Scope, state-of-the-art, and evaluation of techniques
International Journal of Information Management: The Journal for Information Professionals
An overview of recent data base research
ACM SIGMIS Database
Hi-index | 0.00 |
This paper presents the design of a protection system being implemented for the INGRES relational data base management system. A brief description of the INGRES system and its operational environment is first presented to provide the setting for the protection scheme. Mechanisms for protecting physical data files and enforcing sophisticated access control rules for shared relations are then presented. Lastly, the important design decisions concerning protection are discussed.