Database Reference
In-Depth Information
10. Ji-Won Byun and Ninghui Li. 2008. Purpose based access control for
privacy protection in relational database systems. Journal of VLDB 17 (4):
603-619.
11. Cristi Garvey and Amy Wu. ASD—Views. 1988. Proceedings of the IEEE
Conference on Security and Privacy, 85-95.
12. Zhu Hong and Feng Yu-Cai. 2001. Study on mandatory access control
in a secure database management system. Journal of Shanghai University
5 (4): 299-307.
13. Mario Pranjic, KreSimir Fertalj, and Nenad Jukic. 2002. Importance
of semantics in MLS database models. Proceedings of 24th International
Conference on Information Technology Interfaces, 51-56.
14. Hasan M. Jamil and Gillian Dobbie. 2004. On logical foundations of
multilevel secure databases. Journal of Intelligent Information System s
23 (3): 271-294.
15. Luigi Giuri and Pietro lglio. 1996. A role-based secure database design
tool. Proceedings of the 12th Annual Computer Security Applications
Conference, 203-212.
16. Li-xin Xu, Dong Sun, and Dan Liu. 2010. Study on methods for data
confidentiality and data integrity in relational databases. Proceedings of the
3rd IEEE International Conference on Computer Science and Information
Technology (ICCSIT), 292-295.
17. Walid Rjaibi and Paul Bird. 2004. A multi-purpose implementation of
mandatory access control in relational database management systems.
Proceedings of the 30th VLDB Conference , Toronto, Canada, 1010-1020.
18. Indrakshi Ray and Wei Huang. 2005. Event detection in multilevel
secure active databases. Proceedings of the International Conference ICISS
2005, 177-190.
19. Ravi S. Sandhu and Sushil Jajodia. 1992. Polyinstantiation for cover
stories. Proceedings of Second European Symposium on Research in Computer
Security, Toulouse, France, 307-328.
20. Sushil Jajodia, Ravi S. Sandhu, and Barbara T. Blaustein. 1995. Solutions
to the polyinstantiation problem, in information security. An integrated collec-
tion of essays, ed. M. Abrams, IEEE Computer Society Press, 493-529.
21. Doug Nelson and Chip Paradise. 1991. Using polyinstantiation to
develop an MLS application. Proceedings of the Seventh Annual Computer
Security Applications Conference, 12-22.
22. Mikko T. Siponen. 2002. Database security and the problem of polyin-
stantiation: A moral scrutiny. Australasian Journal of Information Systems
10 (1): 41-49.
23. Andro Galinovi and Vlatka Anton. 2007. Polyinstantiation in rela-
tional databases with multilevel security. Proceedings of the ITI 2007 29th
International Conference on Information Technology Interfaces, 128-132.
24. Mark Heckman and William R. Shockley. 1990. The SeaView security
model. IEEE Transactions on Software Engineerin g 16 (6): 593-607.
25. Sushil Jajodia and Ravi S. Sandhu. 1991. A novel decomposition of mul-
tilevel relations into single-level relations. IEEE Symposium on Security
and Privacy, Oakland, California, 300-313.
Search WWH ::




Custom Search