The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract).
Joachim Biskup, Hans Hermann Brüggemann:
The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract).
ICDE 1989: 348-355@inproceedings{DBLP:conf/icde/BiskupB89,
author = {Joachim Biskup and
Hans Hermann Br{\"u}ggemann},
title = {The Personal Model of Data - Towards a Privacy Oriented Information
System (Extended Abstract)},
booktitle = {Proceedings of the Fifth International Conference on Data Engineering,
February 6-10, 1989, Los Angeles, California, USA},
publisher = {IEEE Computer Society},
year = {1989},
isbn = {0-8186-1915-5},
pages = {348-355},
ee = {db/conf/icde/BiskupB89.html},
crossref = {DBLP:conf/icde/89},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Copyright © 1989 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Version: Load the CDROM "Volume 2 Issue 6, ICDE 1984-1995" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
BibTeX
Printed Edition
Proceedings of the Fifth International Conference on Data Engineering, February 6-10, 1989, Los Angeles, California, USA.
IEEE Computer Society 1989, ISBN 0-8186-1915-5
Contents BibTeX
References
- [1]
- Selim G. Akl, Peter D. Taylor:
Cryptographic Solution to a Problem of Access Control in a Hierarchy.
ACM Trans. Comput. Syst. 1(3): 239-248(1983) BibTeX
- [2]
- ...
- [3]
- ...
- [4]
- Joachim Biskup:
Privacy Respecting Permissions and Rights.
DBSec 1987: 173-185 BibTeX
- [5]
- ...
- [6]
- ...
- [7]
- Joachim Biskup, Hans-Werner Graf:
Analysis of the Privacy Model for the Information System DORIS.
DBSec 1988: 123-140 BibTeX
- [8]
- ...
- [9]
- ...
- [10]
- ...
- [11]
- ...
- [12]
- ...
- [13]
- ...
- [14]
- George P. Copeland, David Maier:
Making Smalltalk a Database System.
SIGMOD Conference 1984: 316-325 BibTeX
- [15]
- Peter Dadam, Klaus Küspert, F. Andersen, Henk M. Blanken, R. Erbe, Jürgen Günauer, Vincent Y. Lum, Peter Pistor, Georg Walch:
A DBMS Prototype to Support Extended NF2 Relations: An Integrated View on Flat Tables and Hierarchies.
SIGMOD Conference 1986: 356-367 BibTeX
- [16]
- ...
- [17]
- George I. Davida, David L. Wells, John B. Kam:
A Database Encryption System with Subkeys.
ACM Trans. Database Syst. 6(2): 312-328(1981) BibTeX
- [18]
- ...
- [19]
- Dorothy E. Denning:
Cryptography and Data Security.
Addison-Wesley 1982
BibTeX
- [20]
- ...
- [21]
- Dorothy E. Denning, Selim G. Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell:
Views for Multilevel Database Security.
IEEE Trans. Software Eng. 13(2): 129-140(1987) BibTeX
- [22]
- ...
- [23]
- ...
- [24]
- ...
- [25]
- ...
- [26]
- ...
- [27]
- Deborah Downs, Gerald J. Popek:
A Kernel Design for a Secure Data Base Management System.
VLDB 1977: 507-514 BibTeX
- [28]
- ...
- [29]
- David K. Gifford:
Cryptographic Sealing for Information Secrecy and Authentication.
Commun. ACM 25(4): 274-286(1982) BibTeX
- [30]
- Adele Goldberg, David Robson:
Smalltalk-80: The Language and Its Implementation.
Addison-Wesley 1983
BibTeX
- [31]
- ...
- [32]
- ...
- [33]
- ...
- [34]
- Jim Gray:
An Approach to Decentralized Computer Systems.
IEEE Trans. Software Eng. 12(6): 684-692(1986) BibTeX
- [35]
- Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Database System.
ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
- [36]
- Ehud Gudes:
The Design of a Cryptopgraphy Based Secure File System.
IEEE Trans. Software Eng. 6(5): 411-420(1980) BibTeX
- [37]
- ...
- [38]
- Henry F. Korth:
Extending the Scope of Relational Languages.
IEEE Software 3(1): 19-28(1986) BibTeX
- [39]
- Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean:
A Security Model for Military Message Systems.
ACM Trans. Comput. Syst. 2(3): 198-222(1984) BibTeX
- [40]
- ...
- [41]
- ...
- [42]
- ...
- [43]
- ...
- [44]
- ...
- [45]
- ...
- [46]
- ...
- [47]
- John M. Rushby:
Design and Verification of Secure Systems.
SOSP 1981: 12-21 BibTeX
- [48]
- George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet:
Answering Queries Without Revealing Secrets.
ACM Trans. Database Syst. 8(1): 41-59(1983) BibTeX
- [49]
- Lawrence Snyder:
Formal Models of Capability-Based Protection Systems.
IEEE Trans. Computers 30(3): 172-181(1981) BibTeX
- [50]
- David L. Spooner, Arthur M. Keller, Gio Wiederhold, John Salasin, Deborah Heystek:
Framework for the Security Component of an Ada DBMS.
VLDB 1986: 347-354 BibTeX
- [51]
- Michael Stonebraker:
Implementation of Integrity Constraints and Views by Query Modification.
SIGMOD Conference 1975: 65-78 BibTeX
- [52]
- Michael Stonebraker:
The Case for Shared Nothing.
IEEE Database Eng. Bull. 9(1): 4-9(1986) BibTeX
- [53]
- Michael Stonebraker, Lawrence A. Rowe:
The Design of Postgres.
SIGMOD Conference 1986: 340-355 BibTeX
- [54]
- ...
- [55]
- ...
- [56]
- Mario Tokoro, Yutaka Ishikawa:
An Object-Oriented Approach to Knowledge Systems.
FGCS 1984: 623-631 BibTeX
- [57]
- Jeffrey D. Ullman:
Principles of Database Systems, 2nd Edition.
Computer Science Press 1982, ISBN 0-914894-36-6
BibTeX
- [58]
- ...
- [59]
- ...
Referenced by
- Hans Hermann Brüggemann:
Interaction of Authorities and Acquaintances in the DORIS privacy model of data.
MFDBS 1989: 85-99
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
ICDE Proceedings: Copyright © by IEEE,
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:17:46 2009