Argos - A Configurable Access Control System for Interoperable Environments
暂无分享,去创建一个
[1] David L. Spooner,et al. The Impact of Inheritance on Security in Object-Oriented Database Systems , 1988, DBSec.
[2] Jie Wu,et al. User Group Structures in Object-Oriented Database Authorization , 1994, DBSec.
[3] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[4] Elisa Bertino,et al. An Extended Authorization Model for Relational Databases , 1997, IEEE Trans. Knowl. Data Eng..
[5] John R. Nicol,et al. Object orientation in heterogeneous distributed computing systems , 1993, Computer.
[6] Rafiul Ahad,et al. Supporting Access Control in an Object-Oriented Database Language , 1992, EDBT.
[7] David L. Spooner,et al. Discretionary Access Control in Object-Oriented Engineering Database Systems , 1990, DBSec.
[8] Elisa Bertino,et al. Access Control in Object-Oriented Database Systems - Some Approaches and Issues , 1993, Advanced Database Systems.
[9] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[10] Ching-Yi Wang,et al. Access Control in a Heterogeneous Distributed Database Management System , 1987, IEEE International Symposium on Reliable Distributed Systems.
[11] Ehud Gudes,et al. Security Policies in Object-Oriented Databases , 1989, DBSec.
[12] William Kent,et al. Object-Orientation and Interoperability , 1993, NATO ASI OODBS.
[13] Teresa F. Lunt. Access control policies: Some unanswered questions , 1989, Comput. Secur..
[14] Klaus R. Dittrich,et al. Discretionary Access Control in Structurally Object-Oriented Database Systems , 1988, DBSec.
[15] Sylvia L. Osborn,et al. Role-based security, object oriented databases and separation of duty , 1993, SGMD.
[16] Ehud Gudes,et al. A security model for object-oriented databases , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[17] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[18] Klaus R. Dittrich,et al. An Approach for Building Secure Database Federations , 1994, VLDB.
[19] Ehud Gudes,et al. A Model of Methods Access Authorization in Object-oriented Databases , 1993, VLDB.
[20] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[21] Elisa Bertino,et al. Data hiding and security in object-oriented databases , 1992, [1992] Eighth International Conference on Data Engineering.
[22] Won Kim,et al. A Model of Authorization for Object-Oriented and Semantic Databases , 1988, EDBT.
[23] Elisa Bertino,et al. A new Authorization Model for Object-Oriented Databases , 1994, DBSec.
[24] Eduardo B. Fernandez,et al. Database Security and Integrity , 1981 .
[25] David J. DeWitt,et al. The Object-Oriented Database System Manifesto , 1994, Building an Object-Oriented Database System, The Story of O2.
[26] Fèlix Saltor,et al. Suitability of datamodels as canonical models for federated databases , 1991, SGMD.
[27] T. C. Ting,et al. User-Role Based Security Profiles for an Object-Oriented Design Model , 1993, DBSec.
[28] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[29] Ronald Fagin,et al. On an authorization mechanism , 1978, TODS.
[30] Klaus R. Dittrich,et al. An Object-Oriented Integration Framework for Building Heterogeneous Database Systems , 1992, DS-5.
[31] Sylvia L. Osborn,et al. Database Security Issues in Distributed Object-Oriented Databases , 1992, IWDOM.
[32] Hans Hermann Brüggemann,et al. Rights in an Object-Oriented Environment , 1991, DBSec.
[33] T. C. Ting,et al. Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model , 1991, DBSec.