Data Security

[1]  D. Richard Kuhn,et al.  Role-Based Access Controls , 2009, ArXiv.

[2]  Elena Ferrari,et al.  Database Security , 2009, Encyclopedia of Database Systems.

[3]  Allen B. Tucker,et al.  Authentication, Access Control, and Intrusion Detection , 2004 .

[4]  Elisa Bertino,et al.  Exception-based information flow control in object-oriented systems , 1998, TSEC.

[5]  Sushil Jajodia,et al.  A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[6]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[7]  Elisa Bertino,et al.  An Extended Authorization Model for Relational Databases , 1997, IEEE Trans. Knowl. Data Eng..

[8]  Elisa Bertino,et al.  A Uniied Framework for Enforcing Multiple Access Control Policies , 1997 .

[9]  Elisa Bertino,et al.  Supporting multiple access control policies in database systems , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[10]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[11]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[12]  S. Jajodia,et al.  Information Security: An Integrated Collection of Essays , 1994 .

[13]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[14]  Todd Fine,et al.  Assuring Distributed Trusted Mach , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  Simon S. Lam,et al.  Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..

[16]  Robert R. Moeller,et al.  Network Security , 1993, Inf. Secur. J. A Glob. Perspect..

[17]  Prasun Dewan,et al.  Access control for collaborative environments , 1992, CSCW '92.

[18]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[19]  Elisa Bertino,et al.  A model of authorization for next-generation database systems , 1991, TODS.

[20]  Michael J. Nash,et al.  Some conundrums concerning separation of duty , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[21]  LouAnna Notargiacomo,et al.  Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[22]  R.W. Baldwin,et al.  Naming and grouping privileges to simplify security management in large databases , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[23]  John McLean,et al.  Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[24]  Dan Thomsen,et al.  Role-Based Application Design and Enforcement , 1990, Database Security.

[25]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[26]  Lee Badger A model for specifying multi-granularity integrity policies , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[27]  Teresa F. Lunt Access control policies: Some unanswered questions , 1989, Comput. Secur..

[28]  Ravi Sandhu,et al.  Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[29]  Paul A. Karger,et al.  Limiting the Damage Potential of Discretionary Trojan Horses , 1987, 1987 IEEE Symposium on Security and Privacy.

[30]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[31]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[32]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[33]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[34]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[35]  K. J. Bma Integrity considerations for secure computer systems , 1977 .

[36]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[37]  Bradford W. Wade,et al.  An authorization mechanism for a relational database system , 1976, TODS.

[38]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[39]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..