An Approach for Building Secure Database Federations
暂无分享,去创建一个
[1] W. Alex Gray,et al. Integration of Secrecy Features in a Federated Database Environment , 1993, DBSec.
[2] Klaus R. Dittrich,et al. Complex Subjects, or: The Striving for Complexity is Ruling our World , 1993, DBSec.
[3] John R. Nicol,et al. Object orientation in heterogeneous distributed computing systems , 1993, Computer.
[4] William Kent,et al. Object-Orientation and Interoperability , 1993, NATO ASI OODBS.
[5] Oscar Nierstrasz,et al. CHASSIS - A Platform for Constructing Open Information Systems , 1993 .
[6] Klaus R. Dittrich,et al. An Object-Oriented Integration Framework for Building Heterogeneous Database Systems , 1992, DS-5.
[7] Günther Pernul. Canonical Security Modeling for Federated Databases , 1992, DS-5.
[8] Elisa Bertino,et al. Data hiding and security in object-oriented databases , 1992, [1992] Eighth International Conference on Data Engineering.
[9] Fèlix Saltor,et al. Suitability of datamodels as canonical models for federated databases , 1991, SGMD.
[10] Bhavani M. Thuraisingham,et al. Security Issues in Federated Database Systems: Panel Contributions , 1991, Database Security.
[11] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[12] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[13] A. Sheth. Federated database systems for managing distributed, heterogeneous, and autonomous databases , 1990, CSUR.
[14] David J. DeWitt,et al. The Object-Oriented Database System Manifesto , 1994, Building an Object-Oriented Database System, The Story of O2.
[15] Won Kim,et al. A Model of Authorization for Object-Oriented and Semantic Databases , 1988, EDBT.
[16] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[17] Pragmatics of Access Control in Mermaid , 1987, IEEE Data Eng. Bull..
[18] Eduardo B. Fernandez,et al. Database Security and Integrity , 1981 .
[19] Ronald Fagin,et al. On an authorization mechanism , 1978, TODS.
[20] Michael Stonebraker,et al. The INGRES protection system , 1976, ACM '76.
[21] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[22] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[23] Michael Stonebraker,et al. Implementation of integrity constraints and views by query modification , 1975, SIGMOD '75.
[24] Michael Stonebraker,et al. Access control in a relational data base management system by query modification , 1974, ACM '74.