An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
Cryptography and data security
Cryptography and data security
Toward a multilevel secure relational data model
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
ACM SIGMOD Record - Directions for future database research & development
A logic for reasoning about security
ACM Transactions on Computer Systems (TOCS)
Authorizations in relational database management systems
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A taxonomy for secure object-oriented databases
ACM Transactions on Database Systems (TODS)
A temporal authorization model
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Static detection of security flaws in object-oriented databases
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
Modularized exception handling
ISAW '96 Joint proceedings of the second international software architecture workshop (ISAW-2) and international workshop on multiple perspectives in software development (Viewpoints '96) on SIGSOFT '96 workshops
A discretionary access control model with temporal authorizations
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
The multilevel relational (MLR) data model
ACM Transactions on Information and System Security (TISSEC)
Minimal data upgrading to prevent inference and association attacks
PODS '99 Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Belief reasoning in MLS deductive databases
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
Query execution in prism and seaview: a cost analysis
SAC '95 Proceedings of the 1995 ACM symposium on Applied computing
Secure transaction management and query processing in multilevel secure database systems
SAC '94 Proceedings of the 1994 ACM symposium on Applied computing
An access control model for simplifying constraint expression
Proceedings of the 7th ACM conference on Computer and communications security
Practical safety in flexible access control models
ACM Transactions on Information and System Security (TISSEC)
Storage Efficient and Secure Replicated Distributed Databases
IEEE Transactions on Knowledge and Data Engineering
A MAC Policy Framework for Multilevel Relational Databases
IEEE Transactions on Knowledge and Data Engineering
A Semantic Framework of the Multilevel Secure Relational Model
IEEE Transactions on Knowledge and Data Engineering
Database Concurrency Control in Multilevel Secure Database Management Systems
IEEE Transactions on Knowledge and Data Engineering
A Model Theoretic Semantics for Multi-level Secure Deductive Databases
ICLP '02 Proceedings of the 18th International Conference on Logic Programming
Querying a Multilevel Database: A Logical Analysis
VLDB '96 Proceedings of the 22th International Conference on Very Large Data Bases
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Root Kits: an operating systems viewpoint
ACM SIGOPS Operating Systems Review
The semantics of an extended referential integrity for a multilevel secure relational data model
Data & Knowledge Engineering
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Generalized XML security views
Proceedings of the tenth ACM symposium on Access control models and technologies
Database security curriculum in InfoSec program
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
On logical foundations of multilevel secure databases
Journal of Intelligent Information Systems - Special issue: Database and applications security
Proceedings of the 13th ACM conference on Computer and communications security
Managing the risk of covert information flows in virtual machine systems
Proceedings of the 12th ACM symposium on Access control models and technologies
A layered approach to simplified access control in virtualized systems
ACM SIGOPS Operating Systems Review
International Journal of Electronic Commerce
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Reducing inference control to access control for normalized database schemas
Information Processing Letters
P4A: A New Privacy Model for XML
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Flexible Resolution of Authorisation Conflicts in Distributed Systems
DSOM '08 Proceedings of the 19th IFIP/IEEE international workshop on Distributed Systems: Operations and Management: Managing Large-Scale Service Deployment
Privacy-preserving browser-side scripting with BFlow
Proceedings of the 4th ACM European conference on Computer systems
Controlled Query Evaluation and Inference-Free View Updates
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Distributed and Parallel Databases
Confidentiality policies for controlled query evaluation
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Query rewriting algorithm evaluation for XML security views
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Requirements and protocols for inference-proof interactions in information systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Efficient inference control for open relational queries
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
SEIP: simple and efficient integrity protection for open mobile platforms
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Protecting privacy of sensitive value distributions in data release
STM'10 Proceedings of the 6th international conference on Security and trust management
Policy classes and query rewriting algorithm for XML security views
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Develop secure database system with security extended ER model
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
The instance-based multilevel security model
DESRIST'10 Proceedings of the 5th international conference on Global Perspectives on Design Science Research
BTA: architecture for reusable business tier components with access control
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III
Performance analysis of decomposition techniques in multilevel secure relational database systems
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Enforcing confidentiality in relational databases by reducing inference control to access control
ISC'07 Proceedings of the 10th international conference on Information Security
IFDB: decentralized information flow control for databases
Proceedings of the 8th ACM European Conference on Computer Systems
Modeling and preventing inferences from sensitive value distributions in data release
Journal of Computer Security - STM'10
Hi-index | 0.00 |
A multilevel database is intended to provide the security needed for database systems that contain data at a variety of classifications and serve a set of users having differentclearances. A formal security model for such a system is described. The model is formulated in two layers, one corresponding to a reference monitor that enforces mandatory security, and the second an extension of the standard relational model defining multilevel relations and formalizing policies for labeling new and derived data, data consistency, and discretionary security. The model also defines application-independent properties for entity integrity, referential integrity, and polyinstantiation integrity.