The semantic data model for security: representing the security semantics of an application
暂无分享,去创建一个
[1] G. W. Smith. Identifying and representing the security semantics of an application , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[2] Catherine D. Jensen,et al. SDDM-a prototype of a distributed architecture for database security , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.
[3] Richard D. Graubart,et al. The Integrity-Lock Approach to Secure Database Management , 1984, 1984 IEEE Symposium on Security and Privacy.
[4] Michael L. Brodie. On the Development of Data Models , 1982, On Conceptual Modelling.
[5] David W. Shipman,et al. The functional data model and the data languages DAPLEX , 1981, TODS.
[6] B. Dillaway,et al. A practical design for a multilevel secure database management system , 1986 .
[7] Lois M. L. Delcambre,et al. Constraint analysis for specifying perspectives of class objects , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.
[8] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[9] Susan Darling Urban. ALICE: an assertion language for integrity constraint expression , 1989, [1989] Proceedings of the Thirteenth Annual International Computer Software & Applications Conference.
[10] Serge Abiteboul,et al. IFO: A Formal Semantic Database Model , 1987, ACM Trans. Database Syst..
[11] John P. L. Woodward. Exploiting the Dual Nature of Sensitivity Labels , 1987, 1987 IEEE Symposium on Security and Privacy.
[12] Dennis McLeod,et al. Database description with SDM: a semantic database model , 1981, TODS.
[13] Peter P. Chen. The entity-relationship model: toward a unified view of data , 1975, VLDB '75.
[14] Matthew Morgenstern,et al. Security and inference in multilevel database and knowledge-base systems , 1987, SIGMOD '87.
[15] W. Shipman David,et al. The functional data model and the data language DAPLEX , 1988 .
[16] Matthew Morgenstern,et al. Controlling logical inference in multilevel database systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[17] Neil C. Rowe. Inference-security analysis using resolution theorem-proving , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.
[18] Stanley Y. W. Su,et al. SAM*: A Semantic Association Model for Corporate and Scientific/Statistical Databases , 1983, Inf. Sci..
[19] T.F. Lunt,et al. A near-term design for the SeaView multilevel database system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[20] Cristi Garvey,et al. ASDViews (relational databases) , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[21] Thomas H. Hinke,et al. Inference aggregation detection in database management systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.