ACM SIGMOD Anthology ACM SIGMOD dblp.uni-trier.de

The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract).

Joachim Biskup, Hans Hermann Brüggemann: The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). ICDE 1989: 348-355
@inproceedings{DBLP:conf/icde/BiskupB89,
  author    = {Joachim Biskup and
               Hans Hermann Br{\"u}ggemann},
  title     = {The Personal Model of Data - Towards a Privacy Oriented Information
               System (Extended Abstract)},
  booktitle = {Proceedings of the Fifth International Conference on Data Engineering,
               February 6-10, 1989, Los Angeles, California, USA},
  publisher = {IEEE Computer Society},
  year      = {1989},
  isbn      = {0-8186-1915-5},
  pages     = {348-355},
  ee        = {db/conf/icde/BiskupB89.html},
  crossref  = {DBLP:conf/icde/89},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Copyright © 1989 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 2 Issue 6, ICDE 1984-1995" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Printed Edition

Proceedings of the Fifth International Conference on Data Engineering, February 6-10, 1989, Los Angeles, California, USA. IEEE Computer Society 1989, ISBN 0-8186-1915-5
Contents BibTeX

References

[1]
Selim G. Akl, Peter D. Taylor: Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Trans. Comput. Syst. 1(3): 239-248(1983) BibTeX
[2]
...
[3]
...
[4]
Joachim Biskup: Privacy Respecting Permissions and Rights. DBSec 1987: 173-185 BibTeX
[5]
...
[6]
...
[7]
Joachim Biskup, Hans-Werner Graf: Analysis of the Privacy Model for the Information System DORIS. DBSec 1988: 123-140 BibTeX
[8]
...
[9]
...
[10]
...
[11]
...
[12]
...
[13]
...
[14]
George P. Copeland, David Maier: Making Smalltalk a Database System. SIGMOD Conference 1984: 316-325 BibTeX
[15]
Peter Dadam, Klaus Küspert, F. Andersen, Henk M. Blanken, R. Erbe, Jürgen Günauer, Vincent Y. Lum, Peter Pistor, Georg Walch: A DBMS Prototype to Support Extended NF2 Relations: An Integrated View on Flat Tables and Hierarchies. SIGMOD Conference 1986: 356-367 BibTeX
[16]
...
[17]
George I. Davida, David L. Wells, John B. Kam: A Database Encryption System with Subkeys. ACM Trans. Database Syst. 6(2): 312-328(1981) BibTeX
[18]
...
[19]
Dorothy E. Denning: Cryptography and Data Security. Addison-Wesley 1982
BibTeX
[20]
...
[21]
Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell: Views for Multilevel Database Security. IEEE Trans. Software Eng. 13(2): 129-140(1987) BibTeX
[22]
...
[23]
...
[24]
...
[25]
...
[26]
...
[27]
Deborah Downs, Gerald J. Popek: A Kernel Design for a Secure Data Base Management System. VLDB 1977: 507-514 BibTeX
[28]
...
[29]
David K. Gifford: Cryptographic Sealing for Information Secrecy and Authentication. Commun. ACM 25(4): 274-286(1982) BibTeX
[30]
Adele Goldberg, David Robson: Smalltalk-80: The Language and Its Implementation. Addison-Wesley 1983
BibTeX
[31]
...
[32]
...
[33]
...
[34]
Jim Gray: An Approach to Decentralized Computer Systems. IEEE Trans. Software Eng. 12(6): 684-692(1986) BibTeX
[35]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
[36]
Ehud Gudes: The Design of a Cryptopgraphy Based Secure File System. IEEE Trans. Software Eng. 6(5): 411-420(1980) BibTeX
[37]
...
[38]
Henry F. Korth: Extending the Scope of Relational Languages. IEEE Software 3(1): 19-28(1986) BibTeX
[39]
Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean: A Security Model for Military Message Systems. ACM Trans. Comput. Syst. 2(3): 198-222(1984) BibTeX
[40]
...
[41]
...
[42]
...
[43]
...
[44]
...
[45]
...
[46]
...
[47]
John M. Rushby: Design and Verification of Secure Systems. SOSP 1981: 12-21 BibTeX
[48]
George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet: Answering Queries Without Revealing Secrets. ACM Trans. Database Syst. 8(1): 41-59(1983) BibTeX
[49]
Lawrence Snyder: Formal Models of Capability-Based Protection Systems. IEEE Trans. Computers 30(3): 172-181(1981) BibTeX
[50]
David L. Spooner, Arthur M. Keller, Gio Wiederhold, John Salasin, Deborah Heystek: Framework for the Security Component of an Ada DBMS. VLDB 1986: 347-354 BibTeX
[51]
Michael Stonebraker: Implementation of Integrity Constraints and Views by Query Modification. SIGMOD Conference 1975: 65-78 BibTeX
[52]
Michael Stonebraker: The Case for Shared Nothing. IEEE Database Eng. Bull. 9(1): 4-9(1986) BibTeX
[53]
Michael Stonebraker, Lawrence A. Rowe: The Design of Postgres. SIGMOD Conference 1986: 340-355 BibTeX
[54]
...
[55]
...
[56]
Mario Tokoro, Yutaka Ishikawa: An Object-Oriented Approach to Knowledge Systems. FGCS 1984: 623-631 BibTeX
[57]
Jeffrey D. Ullman: Principles of Database Systems, 2nd Edition. Computer Science Press 1982, ISBN 0-914894-36-6
BibTeX
[58]
...
[59]
...

Referenced by

  1. Hans Hermann Brüggemann: Interaction of Authorities and Acquaintances in the DORIS privacy model of data. MFDBS 1989: 85-99
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
ICDE Proceedings: Copyright © by IEEE,
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:17:46 2009