Database Reference
In-Depth Information
100. Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky, and Allen Parrish.
2005. Enhancing database access control by facilitating non-key related
cover stories.
Journal of Database Management
16 (10): 1-22.
101. Vijayalakshmi Atluri, Sushil Jajodia, and Elisa Bertino. 1997. Transaction
processing in multilevel secure databases with kernelized architecture:
Challenges and solutions.
IEEE Transactions on Knowledge and Data
Engineering
9 (5): 697-708.
102. Jonathan Millen and Teresa Lunt. 1992. Security for object-oriented
database systems.
Proceedings of the IEEE Symposium on Research in
Security and Privacy,
Oakland, CA, 260-272.
103. Thomas Keefe and Wei-Tek Tsai. 1996. A multiversion transaction sched-
uler for centralized multilevel secure database systems.
Proceedings of the
1st High-Assurance Systems Engineering Workshop
(HASE '96), Niagara,
Canada, 206-213.
104. Eduardo Fernandez, Ehud Gudes, and H. Song. 1989. A security model
for object-oriented databases.
Proceedings of the IEEE Symposium on
Security and Privacy,
110-115.
105. Eduardo Fernandez, Ehud Gudes, and H. Song. 1994. A model for
evaluation and administration of security in object-oriented databases.
International Journal of IEEE Transactions on Knowledge and Data
Engineering
6 (2): 275-292.
106. Jeffrey Parsons and Jianmin Su. 2006. Analysis of data structures to sup-
port the instance-based database model.
Proceedings of Design Science
Research in Information Systems and Technology
(DESRIST), Claremont,
CA, 107-130.
107. Jeffrey Parsons and Jianmin Su. 2010. The instance-based multilevel secu-
rity model.
Proceedings of International Conference
DESRIST, 365-380.