ACM SIGMOD Anthology EDBT dblp.uni-trier.de

Views and Security in Distributed Database Management Systems.

Elisa Bertino, Laura M. Haas: Views and Security in Distributed Database Management Systems. EDBT 1988: 155-169
@inproceedings{DBLP:conf/edbt/BertinoH88,
  author    = {Elisa Bertino and
               Laura M. Haas},
  editor    = {Joachim W. Schmidt and
               Stefano Ceri and
               Michele Missikoff},
  title     = {Views and Security in Distributed Database Management Systems},
  booktitle = {Advances in Database Technology - EDBT'88, Proceedings of the
               International Conference on Extending Database Technology, Venice,
               Italy, March 14-18, 1988},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {303},
  year      = {1988},
  isbn      = {3-540-19074-0},
  pages     = {155-169},
  ee        = {db/conf/edbt/BertinoH88.html},
  crossref  = {DBLP:conf/edbt/88},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 2 Issue 2, EDBT, ICDT, MFDBS, DASFAA" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

References

[ASTR76]
Morton M. Astrahan, Mike W. Blasgen, Donald D. Chamberlin, Kapali P. Eswaran, Jim Gray, Patricia P. Griffiths, W. Frank King III, Raymond A. Lorie, Paul R. McJones, James W. Mehl, Gianfranco R. Putzolu, Irving L. Traiger, Bradford W. Wade, Vera Watson: System R: Relational Approach to Database Management. ACM Trans. Database Syst. 1(2): 97-137(1976) BibTeX
[BERT83]
Elisa Bertino, Laura M. Haas, Bruce G. Lindsay: View Management in Distributed Data Base Systems. VLDB 1983: 376-378 BibTeX
[CHAM75]
...
[CHAM80]
...
[CLAY83]
...
[COMP83]
...
[DANI82]
...
[DENN86]
...
[DENN84]
...
[DENN83]
Dorothy E. Denning, Jan Schlörer: Inference Controls for Statistical Databases. IEEE Computer 16(7): 69-82(1983) BibTeX
[DENN79]
Dorothy E. Denning, Peter J. Denning: Data Security. ACM Comput. Surv. 11(3): 227-249(1979) BibTeX
[DENN76]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) BibTeX
[DOWN77]
Deborah Downs, Gerald J. Popek: A Kernel Design for a Secure Data Base Management System. VLDB 1977: 507-514 BibTeX
[FERN81]
...
[GOLD79]
...
[GRIF76]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
[HAAS82]
Laura M. Haas, Patricia G. Selinger, Elisa Bertino, Dean Daniels, Bruce G. Lindsay, Guy M. Lohman, Yoshifumi Masunaga, C. Mohan, Pui Ng, Paul F. Wilms, Robert A. Yost: R*: A Research Project on Distributed Relational DBMS. IEEE Database Eng. Bull. 5(4): 28-32(1982) BibTeX
[KRAU79]
...
[LAND84]
Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean: A Security Model for Military Message Systems. ACM Trans. Comput. Syst. 2(3): 198-222(1984) BibTeX
[LIND84]
Bruce G. Lindsay, Laura M. Haas, C. Mohan, Paul F. Wilms, Robert A. Yost: Computation and Communication in R*: A Distributed Database Manager. ACM Trans. Comput. Syst. 2(1): 24-38(1984) BibTeX
[LIND81]
...
[LOHM85]
Guy M. Lohman, C. Mohan, Laura M. Haas, Dean Daniels, Bruce G. Lindsay, Patricia G. Selinger, Paul F. Wilms: Query Processing in R*. Query Processing in Database Systems 1985: 31-47 BibTeX
[MCCA79]
...
[MURR84]
William H. Murray: Security Considerations for Personal Computers. IBM Systems Journal 23(3): 297-304(1984) BibTeX
[NEED78]
Roger M. Needham, Michael D. Schroeder: Using Encryption for Authentication in Large Networks of Computers. Commun. ACM 21(12): 993-999(1978) BibTeX
[NG82]
...
[PERR84]
...
[POPE79]
...
[RUSH83]
...
[SQL81]
...
[STON76]
Michael Stonebraker, Eugene Wong, Peter Kreps, Gerald Held: The Design and Implementation of INGRES. ACM Trans. Database Syst. 1(3): 189-222(1976) BibTeX
[TRUE83]
Robert P. Trueblood, H. Rex Hartson, Johannes J. Martin: MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management. ACM Trans. Database Syst. 8(3): 382-409(1983) BibTeX
[VOYD83]
Victor L. Voydock, Stephen T. Kent: Security Mechanisms in High-Level Network Protocols. ACM Comput. Surv. 15(2): 135-171(1983) BibTeX
[WALK80]
Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel. Commun. ACM 23(2): 118-131(1980) BibTeX
[WILL81]
R. Williams, Dean Daniels, Laura M. Haas, George Lapis, Bruce G. Lindsay, Pui Ng, Ron Obermarck, Patricia G. Selinger, Adrian Walker, Paul F. Wilms, Robert A. Yost: R*: An Overview of the Architecture. JCDKB 1982: 1-27 BibTeX
[WILM81]
Paul F. Wilms, Bruce G. Lindsay: A Database Authorization Mechanism Supporting Individual and Group Authorization. DDSS 1981: 273-292 BibTeX
[ZIMM80]
...

Referenced by

  1. Elisa Bertino, Pierangela Samarati, Sushil Jajodia: An Extended Authorization Model for Relational Databases. IEEE Trans. Knowl. Data Eng. 9(1): 85-101(1997)
  2. Elisa Bertino, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella: Object-Oriented Query Languages: The Notion and the Issues. IEEE Trans. Knowl. Data Eng. 4(3): 223-237(1992)
  3. Elisa Bertino: Data Hiding and Security in Object-Oriented Databases. ICDE 1992: 338-347
  4. Elisa Bertino: A View Mechanism for Object-Oriented Databases. EDBT 1992: 136-151
  5. Amit P. Sheth, James A. Larson: Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases. ACM Comput. Surv. 22(3): 183-236(1990)
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
Lecture Notes in Computer Science: Copyright © by Springer
Digitization of EDBT/ICDT/MFDBS proceedings was supported by the EDBT Endowment.
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:08:33 2009