ACM SIGMOD Anthology TKDE dblp.uni-trier.de

Information Flow Control in Object-Oriented Systems.

Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia: Information Flow Control in Object-Oriented Systems. IEEE Trans. Knowl. Data Eng. 9(4): 524-538(1997)
@article{DBLP:journals/tkde/SamaratiBCJ97,
  author    = {Pierangela Samarati and
               Elisa Bertino and
               Alessandro Ciampichetti and
               Sushil Jajodia},
  title     = {Information Flow Control in Object-Oriented Systems},
  journal   = {IEEE Trans. Knowl. Data Eng.},
  volume    = {9},
  number    = {4},
  year      = {1997},
  pages     = {524-538},
  ee        = {db/journals/tkde/SamaratiBCJ97.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Copyright © 1997 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


BibTeX

References

[1]
...
[2]
...
[3]
...
[4]
Silvana Castano, Maria Grazia Fugini, Giancarlo Martella, Pierangela Samarati: Database Security. Addison-Wesley & ACM Press 1995, ISBN 0-201-59375-0
Contents BibTeX
[5]
R. G. G. Cattell: Object Data Management: Object-Oriented and Extended Relational Database Systems (Revised Edition). Addison-Wesley 1994, ISBN 0-201-54748-1
BibTeX
[6]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) BibTeX
[7]
...
[8]
Sushil Jajodia, Boris Kogan: Integrating an Object-Oriented Data Model with Multilevel Security. IEEE Symposium on Security and Privacy 1990: 76-85 BibTeX
[9]
Myong H. Kang, Ira S. Moskowitz: A Pump for Rapid, Reliable, Secure Communication. ACM Conference on Computer and Communications Security 1993: 119-129 BibTeX
[10]
Paul A. Karger: Limiting the Damage Potential of Discretionary Trojan Horses. IEEE Symposium on Security and Privacy 1987: 32-37 BibTeX
[11]
Udo Kelter: Discretionary Access Controls in a High-Performance Object Management System. IEEE Symposium on Security and Privacy 1991: 288-299 BibTeX
[12]
Frank Manola, Gail Mitchell: A Comparison of Object Models in ODBMS-Related Standards. IEEE Data Eng. Bull. 17(4): 27-35(1994) BibTeX
[13]
Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo: Beyond the Pale of MAC and DAC-Defining New Forms of Access Control. IEEE Symposium on Security and Privacy 1990: 190-200 BibTeX
[14]
Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314 BibTeX
[15]
...
[16]
...
[17]
A. L. Wilkinson, D. H. Anderson, D. P. Chang, Lee Kock Hin, A. J. Mayo, I. T. Viney, R. Williams, W. Wright: A Penetration Analysis of a Burroughs Large System. Operating Systems Review 15(1): 14-25(1981) BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:50 2009