A MAC Policy Framework for Multilevel Relational Databases.
Xiaolei Qian, Teresa F. Lunt:
A MAC Policy Framework for Multilevel Relational Databases.
IEEE Trans. Knowl. Data Eng. 8(1): 3-15(1996)@article{DBLP:journals/tkde/QianL96,
author = {Xiaolei Qian and
Teresa F. Lunt},
title = {A MAC Policy Framework for Multilevel Relational Databases},
journal = {IEEE Trans. Knowl. Data Eng.},
volume = {8},
number = {1},
year = {1996},
pages = {3-15},
ee = {db/journals/tkde/QianL96.html, db/journals/tkde/QianL96.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Copyright © 1996 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Edition
under construction (file=TKDE8/k0003.pdf)
BibTeX
References
- [1]
- ...
- [2]
- ...
- [3]
- Dorothy E. Denning:
Cryptography and Data Security.
Addison-Wesley 1982
BibTeX
- [4]
- ...
- [5]
- Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden:
A Logic for Reasoning About Security.
ACM Trans. Comput. Syst. 10(3): 226-264(1992) BibTeX
- [6]
- ...
- [7]
- J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen:
The LDV Secure Relational DBMS Model.
DBSec 1990: 265-280 BibTeX
- [8]
- ...
- [9]
- ...
- [10]
- ...
- [11]
- Carl E. Landwehr:
Formal Models for Computer Security.
ACM Comput. Surv. 13(3): 247-278(1981) BibTeX
- [12]
- Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley:
The SeaView Security Model.
IEEE Trans. Software Eng. 16(6): 593-607(1990) BibTeX
- [13]
- ...
- [14]
- Catherine Meadows, Sushil Jajodia:
Integrity Versus Security in Multi-Level Secure Databases.
DBSec 1987: 89-101 BibTeX
- [15]
- James Bret Michael, Edgar H. Sibley, Richard F. Baum, Fu Li:
On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation.
DBSec 1992: 367-386 BibTeX
- [16]
- Philip Morris, John A. McDermid:
The Structure of Permissions: A Normative Framework for Access Rights.
DBSec 1991: 77-97 BibTeX
- [17]
- Jean-Marie Nicolas, Hervé Gallaire:
Data Base: Theory vs. Interpretation.
Logic and Data Bases 1977: 33-54 BibTeX
- [18]
- Günther Pernul:
Canonical Security Modeling for Federated Databases.
DS-5 1992: 207-222 BibTeX
- [19]
- ...
- [20]
- Xiaolei Qian, Teresa F. Lunt:
Tuple-level vs Element-level Classification.
DBSec 1992: 301-316 BibTeX
- [21]
- Xiaolei Qian, Teresa F. Lunt:
A Semantic Framework of the Multilevel Secure Relational Model.
IEEE Trans. Knowl. Data Eng. 9(2): 292-301(1997) BibTeX
- [22]
- ...
- [23]
- ...
- [24]
- Edgar H. Sibley, James Bret Michael, Richard L. Wexelblat:
Use of an Experimental Policy Workbench: Description and Preliminary Results.
DBSec 1991: 47-76 BibTeX
- [25]
- Gary W. Smith:
Modeling Security-Relevant Data Semantics.
IEEE Trans. Software Eng. 17(11): 1195-1203(1991) BibTeX
- [26]
- Kenneth Smith, Marianne Winslett:
Entity Modeling in the MLS Relational Model.
VLDB 1992: 199-210 BibTeX
- [27]
- Gerhard Steinke, Matthias Jarke:
Support for Security Modeling in Information Systems Design.
DBSec 1992: 125-142 BibTeX
- [28]
- ...
- [29]
- Jeffrey D. Ullman:
Principles of Database and Knowledge-Base Systems, Volume I.
Computer Science Press 1988, ISBN 0-7167-8158-1
Contents BibTeX
- [30]
- ...
Referenced by
- Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati:
Minimal Data Upgrading to Prevent Inference and Association.
PODS 1999: 114-125
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:28 2009