A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Integrating an object-oriented data model with multilevel security , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Daryl McCullough,et al. A Hookup Theorem for Multilevel Security , 1990, IEEE Trans. Software Eng..
[3] Jonathan K. Millen,et al. Security for object-oriented database systems , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Ravi S. Sandhu,et al. Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture , 1994, ESORICS.
[5] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[6] David Maier,et al. Development and Implementation of an Object-Oriented DBMS , 1987, Research Directions in Object-Oriented Programming.
[7] Teresa F. Lunt,et al. Multilevel Security for Object-Oriented Database Systems , 1989, Database Security.
[8] James W. Gray,et al. Probabilistic interference , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Ravi S. Sandhu,et al. A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up , 1993, J. Comput. Secur..
[10] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[11] David Maier,et al. Development of an object-oriented DBMS , 1986, OOPSLA 1986.
[12] Won Kim,et al. Integrating an object-oriented programming system with a database system , 1988, OOPSLA '88.
[13] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[14] Wei-Ming Hu,et al. Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Helena Winkler. Sybase Secure SQL Server , 1992 .
[16] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[17] Ming-Chien Shan,et al. Iris: An Object-Oriented Database Management System , 1989, ACM Trans. Inf. Syst..
[18] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[19] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[20] Roshan K. Thomas. Supporting secure and efficient write-up in high-assurance multilevel object-based computing , 1994 .