ACM SIGMOD Anthology TKDE dblp.uni-trier.de

A Model for Evaluation and Administration of Security in Object-Oriented Databases.

Eduardo B. Fernández, Ehud Gudes, Haiyan Song: A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6(2): 275-292(1994)
@article{DBLP:journals/tkde/FernandezGS94,
  author    = {Eduardo B. Fern{\'a}ndez and
               Ehud Gudes and
               Haiyan Song},
  title     = {A Model for Evaluation and Administration of Security in Object-Oriented
               Databases},
  journal   = {IEEE Trans. Knowl. Data Eng.},
  volume    = {6},
  number    = {2},
  year      = {1994},
  pages     = {275-292},
  ee        = {db/journals/tkde/FernandezGS94.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Copyright © 1994 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 3, TKDE 1993-1995" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
...
[2]
Jay Banerjee, Won Kim, Hyoung-Joo Kim, Henry F. Korth: Semantics and Implementation of Schema Evolution in Object-Oriented Databases. SIGMOD Conference 1987: 311-322 BibTeX
[3]
Elisa Bertino, Lorenzo Martino: Object-Oriented Database Management Systems: Concepts and Issues. IEEE Computer 24(4): 33-47(1991) BibTeX
[4]
Klaus R. Dittrich, Martin Härtig, Heribert Pfefferle: Discretionary Access Control in Structurally Object-Oriented Database Systems. DBSec 1988: 105-121 BibTeX
[5]
...
[6]
Eduardo B. Fernández, Rita C. Summers, Tomás Lang: Definition and Evaluation of Access Rules in Data Management Systems. VLDB 1975: 268-285 BibTeX
[7]
...
[8]
Eduardo B. Fernández, Ehud Gudes, Haiyan Song: A Security Model for Object-Oriented Databases. IEEE Symposium on Security and Privacy 1989: 110-115 BibTeX
[9]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
[10]
Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98 BibTeX
[11]
Martin Hardwick, David L. Spooner: The ROSE Data Manager: Using Object Technology to Support Interactive Engineering Applications. IEEE Trans. Knowl. Data Eng. 1(2): 285-289(1989) BibTeX
[12]
...
[13]
Udo Kelter: Discretionary Access Controls in a High-Performance Object Management System. IEEE Symposium on Security and Privacy 1991: 288-299 BibTeX
[14]
Won Kim: Introduction to Object-Oriented Databases. MIT Press 1990, ISBN 0-262-11124-1
BibTeX
[15]
Won Kim: Object-Oriented Databases: Definition and Research Directions. IEEE Trans. Knowl. Data Eng. 2(3): 327-341(1990) BibTeX
[16]
María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández: Security Policies in Object-Oriented Databases. DBSec 1989: 257-268 BibTeX
[17]
Teresa F. Lunt: Access Control Policies for Database Systems. DBSec 1988: 41-52 BibTeX
[18]
Teresa F. Lunt, Eduardo B. Fernández: Database Security. IEEE Data Eng. Bull. 13(4): 43-50(1990) BibTeX
[19]
Jonathan D. Moffett, Morris Sloman: The Source of Authority for Commercial Access Control. IEEE Computer 21(2): 59-69(1988) BibTeX
[20]
...
[21]
Fausto Rabitti, Darrell Woelk, Won Kim: A Model of Authorization for Object-Oriented and Semantic Databases. EDBT 1988: 231-250 BibTeX
[22]
Fausto Rabitti, Elisa Bertino, Won Kim, Darrell Woelk: A Model of Authorization for Next-Generation Database Systems. ACM Trans. Database Syst. 16(1): 88-131(1991) BibTeX
[23]
James E. Rumbaugh, Michael R. Blaha, William J. Premerlani, Frederick Eddy, William E. Lorensen: Object-Oriented Modeling and Design. Prentice-Hall 1991, ISBN 0-13-630054-5
BibTeX
[24]
Ravi S. Sandhu: The NTree: A Two Dimension Partial Order for Protection Groups. ACM Trans. Comput. Syst. 6(2): 197-222(1988) BibTeX
[25]
...
[26]
David L. Spooner: The Impact of Inheritance on Security in Object-Oriented Database Systems. DBSec 1988: 141-150 BibTeX
[27]
...
[28]
Stanley Y. W. Su: Modeling Integrated Manufacturing Data with SAM*. IEEE Computer 19(1): 34-49(1986) BibTeX
[29]
...
[30]
Christopher Wood, Eduardo B. Fernández: Decentralized Authorization in a Database System. VLDB 1979: 352-359 BibTeX

Referenced by

  1. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati: Securing XML Documents. EDBT 2000: 121-135
  2. Ivo Majetic, Ernst L. Leiss: Authorization and Revocation in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 9(4): 668-672(1997)
  3. James M. Slack: Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database. DASFAA 1997: 313-322
  4. Frank Buddrus: Access Control in an Object-Oriented Document Repository. ADBIS 1997: 56-63
  5. Pierangela Samarati, Elisa Bertino, Sushil Jajodia: An Authorization Model for a Distributed Hypertext System. IEEE Trans. Knowl. Data Eng. 8(4): 555-562(1996)
  6. Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa: Authorization and Access Control in IRO-DB. ICDE 1996: 40-47
  7. Nurith Gal-Oz, Ehud Gudes, Eduardo B. Fernández: A Model of Methods Access Authorization in Object-oriented Databases. VLDB 1993: 52-61
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:02 2009