ACM SIGMOD Anthology TKDE dblp.uni-trier.de

A MAC Policy Framework for Multilevel Relational Databases.

Xiaolei Qian, Teresa F. Lunt: A MAC Policy Framework for Multilevel Relational Databases. IEEE Trans. Knowl. Data Eng. 8(1): 3-15(1996)
@article{DBLP:journals/tkde/QianL96,
  author    = {Xiaolei Qian and
               Teresa F. Lunt},
  title     = {A MAC Policy Framework for Multilevel Relational Databases},
  journal   = {IEEE Trans. Knowl. Data Eng.},
  volume    = {8},
  number    = {1},
  year      = {1996},
  pages     = {3-15},
  ee        = {db/journals/tkde/QianL96.html, db/journals/tkde/QianL96.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Copyright © 1996 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


CDROM Edition

under construction (file=TKDE8/k0003.pdf) BibTeX

References

[1]
...
[2]
...
[3]
Dorothy E. Denning: Cryptography and Data Security. Addison-Wesley 1982
BibTeX
[4]
...
[5]
Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden: A Logic for Reasoning About Security. ACM Trans. Comput. Syst. 10(3): 226-264(1992) BibTeX
[6]
...
[7]
J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen: The LDV Secure Relational DBMS Model. DBSec 1990: 265-280 BibTeX
[8]
...
[9]
...
[10]
...
[11]
Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278(1981) BibTeX
[12]
Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley: The SeaView Security Model. IEEE Trans. Software Eng. 16(6): 593-607(1990) BibTeX
[13]
...
[14]
Catherine Meadows, Sushil Jajodia: Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101 BibTeX
[15]
James Bret Michael, Edgar H. Sibley, Richard F. Baum, Fu Li: On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation. DBSec 1992: 367-386 BibTeX
[16]
Philip Morris, John A. McDermid: The Structure of Permissions: A Normative Framework for Access Rights. DBSec 1991: 77-97 BibTeX
[17]
Jean-Marie Nicolas, Hervé Gallaire: Data Base: Theory vs. Interpretation. Logic and Data Bases 1977: 33-54 BibTeX
[18]
Günther Pernul: Canonical Security Modeling for Federated Databases. DS-5 1992: 207-222 BibTeX
[19]
...
[20]
Xiaolei Qian, Teresa F. Lunt: Tuple-level vs Element-level Classification. DBSec 1992: 301-316 BibTeX
[21]
Xiaolei Qian, Teresa F. Lunt: A Semantic Framework of the Multilevel Secure Relational Model. IEEE Trans. Knowl. Data Eng. 9(2): 292-301(1997) BibTeX
[22]
...
[23]
...
[24]
Edgar H. Sibley, James Bret Michael, Richard L. Wexelblat: Use of an Experimental Policy Workbench: Description and Preliminary Results. DBSec 1991: 47-76 BibTeX
[25]
Gary W. Smith: Modeling Security-Relevant Data Semantics. IEEE Trans. Software Eng. 17(11): 1195-1203(1991) BibTeX
[26]
Kenneth Smith, Marianne Winslett: Entity Modeling in the MLS Relational Model. VLDB 1992: 199-210 BibTeX
[27]
Gerhard Steinke, Matthias Jarke: Support for Security Modeling in Information Systems Design. DBSec 1992: 125-142 BibTeX
[28]
...
[29]
Jeffrey D. Ullman: Principles of Database and Knowledge-Base Systems, Volume I. Computer Science Press 1988, ISBN 0-7167-8158-1
Contents BibTeX
[30]
...

Referenced by

  1. Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati: Minimal Data Upgrading to Prevent Inference and Association. PODS 1999: 114-125
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:28 2009