The personal model of data towards a privacy oriented information system
暂无分享,去创建一个
[1] Klaus R. Dittrich,et al. Ein universelles Konzept zum flexiblen Informationsschutz in und mit Rechensystemen , 1983, Informatik-Fachberichte.
[2] David Maier,et al. Making smalltalk a database system , 1984, SIGMOD '84.
[3] Dorothy E. Denning. Cryptographic Checksums for Multilevel Database Security , 1984, 1984 IEEE Symposium on Security and Privacy.
[4] Gio Wiederhold,et al. Framework for the Security Component of an Ada DBMS , 1986, VLDB.
[5] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.
[6] Lawrence Snyder,et al. Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.
[7] Richard Graubart,et al. A Preliminary Naval Surveillance DBMS Security Model. , 1982, S&P 1982.
[8] Henry F. Korth. Extending the Scope of Relational Languages , 1986, IEEE Software.
[9] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[10] Ehud Gudes. The Design of a Cryptography Based Secure File System , 1980, IEEE Transactions on Software Engineering.
[11] David K. Gifford. Cryptographic sealing for information secrecy and authentication , 1982, CACM.
[12] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[13] Billy G. Claybrook. Using Views in a Multilevel Secure Database Management System , 1983, 1983 IEEE Symposium on Security and Privacy.
[14] Richard D. Graubart,et al. The Integrity-Lock Approach to Secure Database Management , 1984, 1984 IEEE Symposium on Security and Privacy.
[15] Selim G. Akl,et al. Views for Multilevel Database Security , 1986, 1986 IEEE Symposium on Security and Privacy.
[16] Joachim Biskup,et al. Analysis of the Privacy Model for the Information System DORIS , 1988, DBSec.
[17] Michael Stonebraker,et al. The Case for Shared Nothing , 1985, HPTS.
[18] J. D. Uiiman,et al. Principles of Database Systems , 2004, PODS 2004.
[19] Joachim Biskup,et al. Privacy Respecting Permissions and Rights , 1988, DBSec.
[20] Dorothy E. Denning,et al. A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.
[21] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[22] Irving L. Traiger,et al. Views, authorization, and locking in a relational data base system , 1975, AFIPS '75.
[23] Richard J. Lipton,et al. A System Architecture to Support a Verifiably Secure Multilevel Security System , 1980, 1980 IEEE Symposium on Security and Privacy.
[24] Carl E. Landwehr,et al. A Formal Statement of the MMS Security Model , 1984, 1984 IEEE Symposium on Security and Privacy.
[25] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[26] Carl E. Landwehr,et al. A security model for military message systems , 1984, TOCS.
[27] Jeffrey D. Ullman,et al. Principles of Database Systems , 1980 .
[28] David A. Bonyun. The Secure Relational Database Management System Kernel: Three Years After , 1980, 1980 IEEE Symposium on Security and Privacy.
[29] Selim G. Akl,et al. Checking Classification Constraints for Consistency and Completeness , 1987, 1987 IEEE Symposium on Security and Privacy.
[30] Henry M. Levy,et al. Capability-Based Computer Systems , 1984 .
[31] William A. Wulf,et al. HYDRA/C.Mmp, An Experimental Computer System , 1981 .
[32] Catherine A. Meadows. The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels , 1987, 1987 IEEE Symposium on Security and Privacy.
[33] Yi-Shiung Yeh,et al. Cryptographic Relational Algebra , 1982, 1982 IEEE Symposium on Security and Privacy.
[34] Peter Dadam,et al. A DBMS prototype to support extended NF2 relations: an integrated view on flat tables and hierarchies , 1986, SIGMOD '86.
[35] Michael Stonebraker,et al. Implementation of integrity constraints and views by query modification , 1975, SIGMOD '75.
[36] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[37] Jim Gray,et al. An approach to decentralized computer systems , 1986, IEEE Transactions on Software Engineering.
[38] David L. Wells,et al. Modified Architecture for the Sub-Keys Model , 1983, 1983 IEEE Symposium on Security and Privacy.
[39] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[40] Klaus R. Dittrich,et al. Protection in the OSKAR Opereting System: Goals, Concepts, Conseqeuences , 1982, 1982 IEEE Symposium on Security and Privacy.
[41] Michael Stonebraker,et al. Access control in a relational data base management system by query modification , 1974, ACM '74.
[42] Michael Stonebraker,et al. The design of POSTGRES , 1986, SIGMOD '86.
[43] Reind P. van de Riet,et al. Answering queries without revealing secrets , 1983, TODS.
[44] Stanley R. Ames. Security Kernels: A Solution or a Problem? , 1981, IEEE Symposium on Security and Privacy.
[45] Joachim Biskup,et al. The personal model of data: Towards a privacy-oriented information system , 1988, Comput. Secur..
[46] Michael Stonebraker,et al. The INGRES protection system , 1976, ACM '76.
[47] Mario Tokoro,et al. An Object-Oriented Approach to Knowledge Systems , 1984, FGCS.