An object-oriented approach to multimedia databases
SIGMOD '86 Proceedings of the 1986 ACM SIGMOD international conference on Management of data
Data model issues for object-oriented applications
ACM Transactions on Information Systems (TOIS)
Multi-level security in database management systems
Computers and Security
Security and inference in multilevel database and knowledge-base systems
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Security checking in relational database management systems augmented with inference engines
Computers and Security
Secure query processing using AI techniques
Proceedings of the Twenty-First Annual Hawaii International Conference on Software Track
Secure Query-Processing Strategies
Computer
A functional view of multilevel databases
Computers and Security
Security in object-oriented database systems
Journal of Object-Oriented Programming
Towards the design of a secure data/knowledge base management system
Data & Knowledge Engineering
SQL extensions for security assertions
Computer Standards & Interfaces
Design of LDV: A Multilevel Secure Relational Database Management
IEEE Transactions on Knowledge and Data Engineering
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
The DIAMOND security policy for object-oriented databases
CSC '92 Proceedings of the 1992 ACM annual conference on Communications
Current status of R&D in trusted database management systems
ACM SIGMOD Record
CACL: efficient fine-grained protection for objects
OOPSLA '92 conference proceedings on Object-oriented programming systems, languages, and applications
A taxonomy for secure object-oriented databases
ACM Transactions on Database Systems (TODS)
A temporal authorization model
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Modularized exception handling
ISAW '96 Joint proceedings of the second international software architecture workshop (ISAW-2) and international workshop on multiple perspectives in software development (Viewpoints '96) on SIGSOFT '96 workshops
Secure computing with the actor paradigm
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
A discretionary access control model with temporal authorizations
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
Research directions in object-oriented database systems
PODS '90 Proceedings of the ninth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
A cryptographic solution to implement access control in a hierarchy and more
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
DMKD '03 Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
The semantics of an extended referential integrity for a multilevel secure relational data model
Data & Knowledge Engineering
MAC and UML for secure software design
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Secure resource description framework: an access control model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Programming versus databases in the object-oriented paradigm
Information and Software Technology
Multilevel secure rules and its impact on the design of active database systems
BNCOD'03 Proceedings of the 20th British national conference on Databases
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Hi-index | 0.00 |
A multilevel secure object-oriented data model (using the ORION data model) is proposed for which mandatory security issues in the context of a database system is discussed. In particular the following issues are dealt with: (1) the security policy for the system, (2) handling polyinstantiation, and (3) handling the inference problem.A set of security properties that has been established in this paper is more complete than those that have been proposed previously. Finally we describe how certain security constraints are handled by our model.