Data Security
暂无分享,去创建一个
Sushil Jajodia | Sabrina De Capitani di Vimercati | Pierangela Samarati | P. Samarati | S. Vimercati | S. Jajodia
[1] D. Richard Kuhn,et al. Role-Based Access Controls , 2009, ArXiv.
[2] Elena Ferrari,et al. Database Security , 2009, Encyclopedia of Database Systems.
[3] Allen B. Tucker,et al. Authentication, Access Control, and Intrusion Detection , 2004 .
[4] Elisa Bertino,et al. Exception-based information flow control in object-oriented systems , 1998, TSEC.
[5] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[6] Fabian Monrose,et al. Authentication via keystroke dynamics , 1997, CCS '97.
[7] Elisa Bertino,et al. An Extended Authorization Model for Relational Databases , 1997, IEEE Trans. Knowl. Data Eng..
[8] Elisa Bertino,et al. A Uniied Framework for Enforcing Multiple Access Control Policies , 1997 .
[9] Elisa Bertino,et al. Supporting multiple access control policies in database systems , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[10] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[11] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[12] S. Jajodia,et al. Information Security: An Integrated Collection of Essays , 1994 .
[13] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[14] Todd Fine,et al. Assuring Distributed Trusted Mach , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Simon S. Lam,et al. Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..
[16] Robert R. Moeller,et al. Network Security , 1993, Inf. Secur. J. A Glob. Perspect..
[17] Prasun Dewan,et al. Access control for collaborative environments , 1992, CSCW '92.
[18] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[19] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[20] Michael J. Nash,et al. Some conundrums concerning separation of duty , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[21] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] R.W. Baldwin,et al. Naming and grouping privileges to simplify security management in large databases , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[23] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[24] Dan Thomsen,et al. Role-Based Application Design and Enforcement , 1990, Database Security.
[25] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[26] Lee Badger. A model for specifying multi-granularity integrity policies , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[27] Teresa F. Lunt. Access control policies: Some unanswered questions , 1989, Comput. Secur..
[28] Ravi Sandhu,et al. Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[29] Paul A. Karger,et al. Limiting the Damage Potential of Discretionary Trojan Horses , 1987, 1987 IEEE Symposium on Security and Privacy.
[30] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[31] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[32] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[33] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[34] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[35] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[36] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[37] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[38] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[39] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..