Database Reference
In-Depth Information
72. Zahid Rashid, Abdul Basit, and Zahid Anwar. 2010. TRDBAC: Temporal
reflective database access control. Proceedings of 6th International
Conference on Emerging Technologies (ICET), 337-342.
73. Vinti M. Doshi, William R. Hemdon, Sushil Jajodia, and Catherine
D. McCollum. 1996. Benchmarking multilevel secure database systems
using the MITRE benchmark. Proceedings of IEEE Transactions on
Knowledge and Data Engineering 8 (1): 46-55.
74. Leon Pan. 2008. Using criterion-based access control for multilevel
database security. Proceedings of International Symposium on Electronic
Commerce and Security, 518-522.
75. Ravi S. Sandhu and Sushil Jajodia. 1993. Referential integrity in multi-
level secure databases. Proceedings of 16th NIST-NCSC National Computer
Security Conference, Baltimore, MD, 39-52.
76. Marco Vieira and Henrique Madeira. 2005. Towards a security benchmark
for database management systems. Proceedings of the 2005 International
Conference on Dependable Systems and Networks, 1-10.
77. Gunther Pernul, A. Min Tjoa, and Werner Winiwarter. 1998. Modeling
data secrecy and integrity. Data & Knowledge Engineering Journal
26 (3): 291-308.
78. Zhu Hong, Zhu Yi, Li Chenyang, Shi Jie, Fu Ge,and Wang Yuanzhen.
2008. Formal specification and verification of an extended security
policy model for database systems. Proceedings of Third Asia-Pacific
Trusted Infrastructure Technologies Conference, 132-141.
79. Xiaolei Qian and Teresa F. Lunt. 1997. A semantic framework of the
multilevel secure relational model. IEEE Transactions on Knowledge and
Data Engineering 9 (2): 292-301.
80. Leon Pan. 2009. A unified network security and fine-grained database
access control model. Proceedings of the Second International Symposium on
Electronic Commerce and Security, 265-269.
81. Kamel Barkaoui, Rahma Ben Ayed, Hanifa Boucheneb, and Awatef
Hicheur. 2008. Verification of workflow processes under multilevel secu-
rity considerations. Proceedings of Third International Conference on Risks
and Security of Internet and Systems, 77-84.
82. Baohua Wang, M. A. Xinqiang, and L. I. Danning. 2008. A formal mul-
tilevel database security model. Proceedings of International Conference on
Computational Intelligence and Security, 252-256.
83. Yongzhong He, Zhen Han, Huirong Fu, and Guangzhi Qu. 2010. he
formal model of DBMS enforcing multiple security policies. Journal of
Software 5 (5): 514-521.
84. Veluchandhar Vadivelu, R. V. Jayakumar, M. Muthuvel,
K. Balasubramanian, A. Karthi, Karthikesan, G. Ramaiyan, Alagarsamy
Deepa, and S. Albert Rabara. 2008. A backup mechanism with con-
currency control for multilevel secure distributed database systems.
Proceedings of Third IEEE International Conference on Digital Information
Management (ICDIM), 57-62.
85. Aidong Zhang and Ahmed Elmagarmid. 1993. A theory of global concur-
rency control in multidatabase systems. Journal of VLDB 2 (3): 331-359.
Search WWH ::




Custom Search