Information Flow Control in Object-Oriented Systems.
Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia:
Information Flow Control in Object-Oriented Systems.
IEEE Trans. Knowl. Data Eng. 9(4): 524-538(1997)@article{DBLP:journals/tkde/SamaratiBCJ97,
author = {Pierangela Samarati and
Elisa Bertino and
Alessandro Ciampichetti and
Sushil Jajodia},
title = {Information Flow Control in Object-Oriented Systems},
journal = {IEEE Trans. Knowl. Data Eng.},
volume = {9},
number = {4},
year = {1997},
pages = {524-538},
ee = {db/journals/tkde/SamaratiBCJ97.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Copyright © 1997 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
BibTeX
References
- [1]
- ...
- [2]
- ...
- [3]
- ...
- [4]
- Silvana Castano, Maria Grazia Fugini, Giancarlo Martella, Pierangela Samarati:
Database Security.
Addison-Wesley & ACM Press 1995, ISBN 0-201-59375-0
Contents BibTeX
- [5]
- R. G. G. Cattell:
Object Data Management: Object-Oriented and Extended Relational Database Systems (Revised Edition).
Addison-Wesley 1994, ISBN 0-201-54748-1
BibTeX
- [6]
- Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243(1976) BibTeX
- [7]
- ...
- [8]
- Sushil Jajodia, Boris Kogan:
Integrating an Object-Oriented Data Model with Multilevel Security.
IEEE Symposium on Security and Privacy 1990: 76-85 BibTeX
- [9]
- Myong H. Kang, Ira S. Moskowitz:
A Pump for Rapid, Reliable, Secure Communication.
ACM Conference on Computer and Communications Security 1993: 119-129 BibTeX
- [10]
- Paul A. Karger:
Limiting the Damage Potential of Discretionary Trojan Horses.
IEEE Symposium on Security and Privacy 1987: 32-37 BibTeX
- [11]
- Udo Kelter:
Discretionary Access Controls in a High-Performance Object Management System.
IEEE Symposium on Security and Privacy 1991: 288-299 BibTeX
- [12]
- Frank Manola, Gail Mitchell:
A Comparison of Object Models in ODBMS-Related Standards.
IEEE Data Eng. Bull. 17(4): 27-35(1994) BibTeX
- [13]
- Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo:
Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.
IEEE Symposium on Security and Privacy 1990: 190-200 BibTeX
- [14]
- Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases.
DBSec 1991: 297-314 BibTeX
- [15]
- ...
- [16]
- ...
- [17]
- A. L. Wilkinson, D. H. Anderson, D. P. Chang, Lee Kock Hin, A. J. Mayo, I. T. Viney, R. Williams, W. Wright:
A Penetration Analysis of a Burroughs Large System.
Operating Systems Review 15(1): 14-25(1981) BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:50 2009