The multilevel relational (MLR) data model
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Database Security: Status and Prospects: Proceedings of the IFIP Tc11 4th Working Conference, Halifax, U. K., 18-21 Sept., 1990 , 1991 .
[2] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[3] Sushil Jajodia,et al. Update semantics for multilevel relations , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.
[4] Database Security, IV: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990 , 1991, DBSec.
[5] Dan Thomsen,et al. The LDV Secure Relational DBMS Model , 1990, DBSec.
[6] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[7] Bhavani M. Thuraisingham,et al. A nonmonotonic typed multilevel logic for multilevel secure data/knowledge base management systems , 1991, Proceedings Computer Security Foundations Workshop IV.
[8] Fang Chen,et al. The semantics and expressive power of the MLR data model , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[9] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[10] Marianne Winslett,et al. Entity Modeling in the MLS Relational Model , 1992, VLDB.
[11] Sushil Jajodia,et al. A new polyinstantiation integrity constraint for multilevel relations , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[12] Xiaolei Qian,et al. A Model-Theoretic Semantics of the Multilevel Relational Model , 1994, EDBT.
[13] Sushil Jajodia,et al. Toward a multilevel secure relational data model , 1991, SIGMOD '91.
[14] Teresa F. Lunt,et al. Tuple-level vs Element-level Classification , 1993, Database Security.
[15] Sushil Jajodia,et al. Polyinstantation for Cover Stories , 1992, ESORICS.
[16] Sushil Jajodia,et al. Honest Databases That Can Keep Secrets , 1991 .
[17] Sushil Jajodia,et al. Referential Integrity In Multilevel Secure Databases , 1993 .
[18] Dorothy E. Denning,et al. The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.