A Model for Evaluation and Administration of Security in Object-Oriented Databases.
Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Model for Evaluation and Administration of Security in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng. 6(2): 275-292(1994)@article{DBLP:journals/tkde/FernandezGS94,
author = {Eduardo B. Fern{\'a}ndez and
Ehud Gudes and
Haiyan Song},
title = {A Model for Evaluation and Administration of Security in Object-Oriented
Databases},
journal = {IEEE Trans. Knowl. Data Eng.},
volume = {6},
number = {2},
year = {1994},
pages = {275-292},
ee = {db/journals/tkde/FernandezGS94.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Copyright © 1994 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Version: Load the CDROM "Volume 3 Issue 3, TKDE 1993-1995" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
References
- [1]
- ...
- [2]
- Jay Banerjee, Won Kim, Hyoung-Joo Kim, Henry F. Korth:
Semantics and Implementation of Schema Evolution in Object-Oriented Databases.
SIGMOD Conference 1987: 311-322 BibTeX
- [3]
- Elisa Bertino, Lorenzo Martino:
Object-Oriented Database Management Systems: Concepts and Issues.
IEEE Computer 24(4): 33-47(1991) BibTeX
- [4]
- Klaus R. Dittrich, Martin Härtig, Heribert Pfefferle:
Discretionary Access Control in Structurally Object-Oriented Database Systems.
DBSec 1988: 105-121 BibTeX
- [5]
- ...
- [6]
- Eduardo B. Fernández, Rita C. Summers, Tomás Lang:
Definition and Evaluation of Access Rules in Data Management Systems.
VLDB 1975: 268-285 BibTeX
- [7]
- ...
- [8]
- Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Security Model for Object-Oriented Databases.
IEEE Symposium on Security and Privacy 1989: 110-115 BibTeX
- [9]
- Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Database System.
ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
- [10]
- Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases.
DBSec 1990: 85-98 BibTeX
- [11]
- Martin Hardwick, David L. Spooner:
The ROSE Data Manager: Using Object Technology to Support Interactive Engineering Applications.
IEEE Trans. Knowl. Data Eng. 1(2): 285-289(1989) BibTeX
- [12]
- ...
- [13]
- Udo Kelter:
Discretionary Access Controls in a High-Performance Object Management System.
IEEE Symposium on Security and Privacy 1991: 288-299 BibTeX
- [14]
- Won Kim:
Introduction to Object-Oriented Databases.
MIT Press 1990, ISBN 0-262-11124-1
BibTeX
- [15]
- Won Kim:
Object-Oriented Databases: Definition and Research Directions.
IEEE Trans. Knowl. Data Eng. 2(3): 327-341(1990) BibTeX
- [16]
- María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Security Policies in Object-Oriented Databases.
DBSec 1989: 257-268 BibTeX
- [17]
- Teresa F. Lunt:
Access Control Policies for Database Systems.
DBSec 1988: 41-52 BibTeX
- [18]
- Teresa F. Lunt, Eduardo B. Fernández:
Database Security.
IEEE Data Eng. Bull. 13(4): 43-50(1990) BibTeX
- [19]
- Jonathan D. Moffett, Morris Sloman:
The Source of Authority for Commercial Access Control.
IEEE Computer 21(2): 59-69(1988) BibTeX
- [20]
- ...
- [21]
- Fausto Rabitti, Darrell Woelk, Won Kim:
A Model of Authorization for Object-Oriented and Semantic Databases.
EDBT 1988: 231-250 BibTeX
- [22]
- Fausto Rabitti, Elisa Bertino, Won Kim, Darrell Woelk:
A Model of Authorization for Next-Generation Database Systems.
ACM Trans. Database Syst. 16(1): 88-131(1991) BibTeX
- [23]
- James E. Rumbaugh, Michael R. Blaha, William J. Premerlani, Frederick Eddy, William E. Lorensen:
Object-Oriented Modeling and Design.
Prentice-Hall 1991, ISBN 0-13-630054-5
BibTeX
- [24]
- Ravi S. Sandhu:
The NTree: A Two Dimension Partial Order for Protection Groups.
ACM Trans. Comput. Syst. 6(2): 197-222(1988) BibTeX
- [25]
- ...
- [26]
- David L. Spooner:
The Impact of Inheritance on Security in Object-Oriented Database Systems.
DBSec 1988: 141-150 BibTeX
- [27]
- ...
- [28]
- Stanley Y. W. Su:
Modeling Integrated Manufacturing Data with SAM*.
IEEE Computer 19(1): 34-49(1986) BibTeX
- [29]
- ...
- [30]
- Christopher Wood, Eduardo B. Fernández:
Decentralized Authorization in a Database System.
VLDB 1979: 352-359 BibTeX
Referenced by
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:
Securing XML Documents.
EDBT 2000: 121-135
- Ivo Majetic, Ernst L. Leiss:
Authorization and Revocation in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng. 9(4): 668-672(1997)
- James M. Slack:
Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database.
DASFAA 1997: 313-322
- Frank Buddrus:
Access Control in an Object-Oriented Document Repository.
ADBIS 1997: 56-63
- Pierangela Samarati, Elisa Bertino, Sushil Jajodia:
An Authorization Model for a Distributed Hypertext System.
IEEE Trans. Knowl. Data Eng. 8(4): 555-562(1996)
- Wolfgang Eßmayr, Fritz Kastner, Günther Pernul, Stefan Preishuber, A. Min Tjoa:
Authorization and Access Control in IRO-DB.
ICDE 1996: 40-47
- Nurith Gal-Oz, Ehud Gudes, Eduardo B. Fernández:
A Model of Methods Access Authorization in Object-oriented Databases.
VLDB 1993: 52-61
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:02 2009