An Approach for Building Secure Database Federations

[1]  W. Alex Gray,et al.  Integration of Secrecy Features in a Federated Database Environment , 1993, DBSec.

[2]  Klaus R. Dittrich,et al.  Complex Subjects, or: The Striving for Complexity is Ruling our World , 1993, DBSec.

[3]  John R. Nicol,et al.  Object orientation in heterogeneous distributed computing systems , 1993, Computer.

[4]  William Kent,et al.  Object-Orientation and Interoperability , 1993, NATO ASI OODBS.

[5]  Oscar Nierstrasz,et al.  CHASSIS - A Platform for Constructing Open Information Systems , 1993 .

[6]  Klaus R. Dittrich,et al.  An Object-Oriented Integration Framework for Building Heterogeneous Database Systems , 1992, DS-5.

[7]  Günther Pernul Canonical Security Modeling for Federated Databases , 1992, DS-5.

[8]  Elisa Bertino,et al.  Data hiding and security in object-oriented databases , 1992, [1992] Eighth International Conference on Data Engineering.

[9]  Fèlix Saltor,et al.  Suitability of datamodels as canonical models for federated databases , 1991, SGMD.

[10]  Bhavani M. Thuraisingham,et al.  Security Issues in Federated Database Systems: Panel Contributions , 1991, Database Security.

[11]  John M. Boone,et al.  INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .

[12]  Elisa Bertino,et al.  A model of authorization for next-generation database systems , 1991, TODS.

[13]  A. Sheth Federated database systems for managing distributed, heterogeneous, and autonomous databases , 1990, CSUR.

[14]  David J. DeWitt,et al.  The Object-Oriented Database System Manifesto , 1994, Building an Object-Oriented Database System, The Story of O2.

[15]  Won Kim,et al.  A Model of Authorization for Object-Oriented and Semantic Databases , 1988, EDBT.

[16]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[17]  Pragmatics of Access Control in Mermaid , 1987, IEEE Data Eng. Bull..

[18]  Eduardo B. Fernandez,et al.  Database Security and Integrity , 1981 .

[19]  Ronald Fagin,et al.  On an authorization mechanism , 1978, TODS.

[20]  Michael Stonebraker,et al.  The INGRES protection system , 1976, ACM '76.

[21]  Bradford W. Wade,et al.  An authorization mechanism for a relational database system , 1976, TODS.

[22]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[23]  Michael Stonebraker,et al.  Implementation of integrity constraints and views by query modification , 1975, SIGMOD '75.

[24]  Michael Stonebraker,et al.  Access control in a relational data base management system by query modification , 1974, ACM '74.