ACM SIGMOD Anthology ACM SIGMOD dblp.uni-trier.de

Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database.

James M. Slack: Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database. DASFAA 1997: 313-322
@inproceedings{DBLP:conf/dasfaa/Slack97,
  author    = {James M. Slack},
  editor    = {Rodney W. Topor and
               Katsumi Tanaka},
  title     = {Using Security Methods to Enforce Mandatory and Discretionary
               Access Control in an Object Database},
  booktitle = {Database Systems for Advanced Applications '97, Proceedings of
               the Fifth International Conference on Database Systems for Advanced
               Applications (DASFAA), Melbourne, Australia, April 1-4, 1997},
  publisher = {World Scientific},
  series    = {Advanced Database Research and Development Series},
  volume    = {6},
  year      = {1997},
  isbn      = {981-02-3107-5},
  pages     = {313-322},
  ee        = {db/conf/dasfaa/Slack97.html},
  crossref  = {DBLP:conf/dasfaa/97},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 2 Issue 3, SIGIR, DASFAA'97, OODBS'86" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

References

[1]
...
[2]
Silvana Castano, Maria Grazia Fugini, Giancarlo Martella, Pierangela Samarati: Database Security. Addison-Wesley & ACM Press 1995, ISBN 0-201-59375-0
Contents BibTeX
[3]
R. G. G. Cattell: Introduction to the Special Section on Next-Generation Database Systems. Commun. ACM 34(10): 30-33(1991) BibTeX
[4]
...
[5]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) BibTeX
[6]
...
[7]
Eduardo B. Fernández, Ehud Gudes, Haiyan Song: A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6(2): 275-292(1994) BibTeX
[8]
Adele Goldberg, David Robson: Smalltalk-80: The Language and Its Implementation. Addison-Wesley 1983
BibTeX
[9]
...
[10]
Won Kim: Research Directions in Object-Oriented Database Systems. PODS 1990: 1-15 BibTeX
[11]
Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278(1981) BibTeX
[12]
Roberto Maiocchi, Barbara Pernici, Federico Barbic: Automatic Deduction of Temporal Information. ACM Trans. Database Syst. 17(4): 647-688(1992) BibTeX
[13]
...
[14]
...
[15]
...
[16]
James M. Slack: Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database. DASFAA 1997: 313-322 BibTeX
[17]
...
[18]
Roshan K. Thomas, Ravi S. Sandhu: A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 8(1): 16-31(1996) BibTeX

Referenced by

  1. James M. Slack: Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database. DASFAA 1997: 313-322
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
DASFAA 1997 Proceedings: Copyright © by World Scientific Publishing Pte Ltd.
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:05:33 2009