Database Reference
In-Depth Information
26. Sushil Jajodia and Ravi Sandhu. 1991. Toward a multilevel secure
relational data model. Proceedings of ACM SIGMOD International
Conference on Management Data, Denver, Colorado, 50-59.
27. Joachim Biskup and Lena Wiese. 2009. Combining consistency and
confidentiality requirements in first-order databases. Proceedings of
International Conference ISC 2009, 121-134.
28. Ravi Sandhu and Fang Chen. 1998. The multilevel relational (MLR) data
model. ACM Transactions on Information and System Security 1 (1): 93-132.
29. Nenad Jukic, Susan V. Vrbsky, Allen Parrish, Brandon Dixon, and
Boris Jukic. A belief-consistent multilevel secure relational data model.
Information Systems 24 (5): 377-402.
30. Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark Heckman, and
Dan Warren. 1988. A near-term design for the SeaView multilevel database
system. Proceedings of the IEEE Symposium on Security and Privacy, 234-244.
31. Frederic Cuppens and Kioumars Yazdanian. 1992. A natural decom-
position of multi-level relations. Proceedings of the IEEE Symposium on
Security and Privacy, 273-284.
32. Keith F. Brewster. 1996. Trusted database management system inter-
pretation of the trusted computer system evaluation criteria. National
Computer Security Center, NCSC technical report-005, 3 (5): 1-57.
33. Ravi Sandhu and Fang Chen. 1995. The semantics and expressive power
of the MLR data model. Proceedings of IEEE Conference on Security and
Privacy , Oakland, CA, 128-142.
34. Mario Pranjic, Nenad Jukic, and Krcsimir Fertalj. 2003. Implementing
belief-consistent multilevel secure relational data model: Issues and solu-
tions. Proceedings of 25th International Conference Information Technology
Interfaces IT1, 149-154.
35. Nenad A. Jukic and Susan V. Vrbsky. 1997. Asserting beliefs in MLS
relational models. Proceedings of SIGMOD Record 26 (3): 30-35.
36. B. Schneier. 1996. Applied cryptography, 2nd ed. New York: John Wiley
& Sons.
37. L. Kocarev. 2001. Chaos-based cryptography: A brief overview. IEEE
Circulation Systems Magazine 1 (3): 6-21.
38. D. Stinson. 2002. Cryptography: Theory and practice, 2nd ed. Boca Raton,
FL: Chapman & Hall.
39. Y. Mao, G. Chen, and S. Lian. 2004. A novel fast image encryption scheme
based on 3D chaotic Baker maps. International Journal of Bifurcation and
Chaos 14 (10): 3613-3624.
40. S. Li. 2003. Analyses and new designs of digital chaotic ciphers. PhD
thesis, School of Electronics & Information Engineering, Xi'an Jiaotong
University, Xi'an, China.
41. National Bureau of Standards. 1980. Data encryption standard modes
of operation, federal information processing standards publication 81.
U.S. Government Printing Office, Washington, DC.
42. S. Li, G. Chen, and X. Zheng. 2004. Chaos-based encryption for digital
images and videos. In Multimedia security handbook, chap. 4. Boca Raton,
FL: CRC Press.
Search WWH ::




Custom Search