Database Reference
In-Depth Information
100. Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky, and Allen Parrish.
2005. Enhancing database access control by facilitating non-key related
cover stories. Journal of Database Management 16 (10): 1-22.
101. Vijayalakshmi Atluri, Sushil Jajodia, and Elisa Bertino. 1997. Transaction
processing in multilevel secure databases with kernelized architecture:
Challenges and solutions. IEEE Transactions on Knowledge and Data
Engineering 9 (5): 697-708.
102. Jonathan Millen and Teresa Lunt. 1992. Security for object-oriented
database systems. Proceedings of the IEEE Symposium on Research in
Security and Privacy, Oakland, CA, 260-272.
103. Thomas Keefe and Wei-Tek Tsai. 1996. A multiversion transaction sched-
uler for centralized multilevel secure database systems. Proceedings of the
1st High-Assurance Systems Engineering Workshop (HASE '96), Niagara,
Canada, 206-213.
104. Eduardo Fernandez, Ehud Gudes, and H. Song. 1989. A security model
for object-oriented databases. Proceedings of the IEEE Symposium on
Security and Privacy, 110-115.
105. Eduardo Fernandez, Ehud Gudes, and H. Song. 1994. A model for
evaluation and administration of security in object-oriented databases.
International Journal of IEEE Transactions on Knowledge and Data
Engineering 6 (2): 275-292.
106. Jeffrey Parsons and Jianmin Su. 2006. Analysis of data structures to sup-
port the instance-based database model. Proceedings of Design Science
Research in Information Systems and Technology (DESRIST), Claremont,
CA, 107-130.
107. Jeffrey Parsons and Jianmin Su. 2010. The instance-based multilevel secu-
rity model. Proceedings of International Conference DESRIST, 365-380.
Search WWH ::




Custom Search