Concepts and capabilities of a database computer\
ACM Transactions on Database Systems (TODS)
The design of a rotating associative memory for relational database applications
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
Performance evaluation of a relational associative processor
ACM Transactions on Database Systems (TODS)
Multiprocessor Organization—a Survey
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
A lattice model of secure information flow
Communications of the ACM
A back-end computer for data base management
Communications of the ACM
A formal system for information retrieval from files
Communications of the ACM
A Semantic Model for Data Base Protection Languages
Systems for Large Data Bases
The architecture of CASSM: A cellular system for non-numeric processing
ISCA '73 Proceedings of the 1st annual symposium on Computer architecture
Full protection specifications in the semantic model for database protection languages
ACM '76 Proceedings of the 1976 annual conference
Evaluation of conversion to a back-end data base management system
ACM '76 Proceedings of the 1976 annual conference
The enforcement of security policies for computation
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
ICSE '76 Proceedings of the 2nd international conference on Software engineering
A model for data secure systems.
A model for data secure systems.
The architectural design of a secure data base management system.
The architectural design of a secure data base management system.
Relacs, an associative computer architecture to support a relational data model
Relacs, an associative computer architecture to support a relational data model
Retrieval operations and data representations in a context-addressed disc system
SIGPLAN '73 Proceedings of the 1973 meeting on Programming languages and information retrieval
Architectural Support for System Protection and Database Security
IEEE Transactions on Computers
Hi-index | 0.00 |
The functional requirements of secure database systems, and underlying security mechanisms needed to support these requirements impose the need for these very general characteristics in a system design: modularity, simplicity, isolatability, and flexibility. It has been observed MANOF77 that thus far the solutions to data security problems have largely been ad hoc and brute force. A view that can stand back and consider the entire system architecture, rather than concentrating on tuning up individual mechanisms, offers hope for more elegant solutions in the future. Perhaps the single most important conclusion of this report is, not to suggest a solution or a particular system, but to recommend a direction and an approach. The bulk of the evidence and information that went into the making of this report points toward system architecture approaches as the most effective way to satisfy the increasingly complex and often competing requirements. In fact, it appears to be the only approach in which the design of such large systems can be understood and believed to be secure.