Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database.
James M. Slack:
Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database.
DASFAA 1997: 313-322@inproceedings{DBLP:conf/dasfaa/Slack97,
author = {James M. Slack},
editor = {Rodney W. Topor and
Katsumi Tanaka},
title = {Using Security Methods to Enforce Mandatory and Discretionary
Access Control in an Object Database},
booktitle = {Database Systems for Advanced Applications '97, Proceedings of
the Fifth International Conference on Database Systems for Advanced
Applications (DASFAA), Melbourne, Australia, April 1-4, 1997},
publisher = {World Scientific},
series = {Advanced Database Research and Development Series},
volume = {6},
year = {1997},
isbn = {981-02-3107-5},
pages = {313-322},
ee = {db/conf/dasfaa/Slack97.html},
crossref = {DBLP:conf/dasfaa/97},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
CDROM Version: Load the CDROM "Volume 2 Issue 3, SIGIR, DASFAA'97, OODBS'86" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
BibTeX
References
- [1]
- ...
- [2]
- Silvana Castano, Maria Grazia Fugini, Giancarlo Martella, Pierangela Samarati:
Database Security.
Addison-Wesley & ACM Press 1995, ISBN 0-201-59375-0
Contents BibTeX
- [3]
- R. G. G. Cattell:
Introduction to the Special Section on Next-Generation Database Systems.
Commun. ACM 34(10): 30-33(1991) BibTeX
- [4]
- ...
- [5]
- Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243(1976) BibTeX
- [6]
- ...
- [7]
- Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Model for Evaluation and Administration of Security in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng. 6(2): 275-292(1994) BibTeX
- [8]
- Adele Goldberg, David Robson:
Smalltalk-80: The Language and Its Implementation.
Addison-Wesley 1983
BibTeX
- [9]
- ...
- [10]
- Won Kim:
Research Directions in Object-Oriented Database Systems.
PODS 1990: 1-15 BibTeX
- [11]
- Carl E. Landwehr:
Formal Models for Computer Security.
ACM Comput. Surv. 13(3): 247-278(1981) BibTeX
- [12]
- Roberto Maiocchi, Barbara Pernici, Federico Barbic:
Automatic Deduction of Temporal Information.
ACM Trans. Database Syst. 17(4): 647-688(1992) BibTeX
- [13]
- ...
- [14]
- ...
- [15]
- ...
- [16]
- James M. Slack:
Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database.
DASFAA 1997: 313-322 BibTeX
- [17]
- ...
- [18]
- Roshan K. Thomas, Ravi S. Sandhu:
A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng. 8(1): 16-31(1996) BibTeX
Referenced by
- James M. Slack:
Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database.
DASFAA 1997: 313-322
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
DASFAA 1997 Proceedings: Copyright © by World Scientific Publishing Pte Ltd.
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:05:33 2009