Database Reference
In-Depth Information
REFERENCES
Ferraiolo, D. F., & Kuhn, R. (1992, October).
Role-based access control (rbac). In
Proc. 15th
NIST-NSA National Computer Security Confer-
ence
. Baltimore, MD.
Adam, N. R., & Worthmann, J. C. (1989). Security-
control methods for statistical databases: A com-
parative study.
ACM Computing Surveys
,
21
(4),
515-556. doi:10.1145/76894.76895
Guimaraes, M. (2006). New challenges in teaching
database security. In
InfoSecCD '06: Proceedings
of the 3rd annual conference on Information se-
curity curriculum development
(pp. 64-67). New
York: ACM.
Aggarwal, C. C. (2005). On k-anonymity and the
curse of dimensionality. In
Proceedings of the 31st
VLDB Conference
.
Avizienis, A., Laprie, J.-C., Randell, B., &
Landwehr, C. (2004). Basic concepts and tax-
onomy of dependable and secure computing.
IEEE
Transactions on Dependable and Secure Comput-
ing
,
1
(1), 11-33. doi:10.1109/TDSC.2004.2
Landwehr, C. E. (2001). Computer security.
International Journal of Information Security
,
1
(1), 3-13.
Loukides, G., & Shao, J. (2007). Capturing data
usefulness and privacy protection in k-anonymis-
ation. In
SAC '07: Proceedings of the 2007 ACM
symposium on Applied computing
(pp. 370-374).
New York: ACM.
Bell, D., & La Padula, L. (1975).
Secure computer
system: Unified exposition and multics interpreta-
tion
(Esd-tr-75-306, Technical Report mtr-2997).
Bedford, MA: The MITRE Corporation.
Machanavajjhala,A., Gehrke, J., Kifer, D., & Ven-
kitasubramaniam, M. (2006). L-diversity: Privacy
beyond k -anonymity. In
ICDE '06: Proceedings
of the 22nd International Conference on Data
Engineering (ICDE'06)
, 24, Washington, DC:
IEEE Computer Society.
Bertino, E., Khan, L. R., Sandhu, R., & Thurais-
ingham, B. (2006, May). Secure knowledge man-
agement: Confidentiality, trust, and privacy.
IEEE
Transactions on Systems, Man, and Cybernetics.
Part A, Systems and Humans
,
36
(3), 429-438.
doi:10.1109/TSMCA.2006.871796
Mitre Corporation (1997,April).
Integrity consid-
erations for secure computer systems.
(Technical
Report esdtr-76-372, esd,/afsc, mtr 3153). Bed-
ford, MA: Mitre Corporation.
Castano, S., Martella, G., Samarati, P., & Fugini,
M. (1994).
Database Security
. Addison-Wesely,
ACM Press.
Denning, D. E. (1982).
Cryptography and data
security
. Reading, MA: Addison Wesley.
Nyanchama, M., & Osborn, S. (1994). Ifip wg
11.3 working conf. on database security. database
security viii: Status and prospects. In
Proc. 15th
Annual Computer Security Applications Confer-
ence
. North-Holland.
Denning, D. E., & Denning, P. J. (1979). Data se-
curity.
ACM Computing Surveys
,
11
(3), 227-249.
doi:10.1145/356778.356782
Osborn, S., Sandhu, R. S., & Munawer, Q.
(2000). Configuring role-based access control
to enforce mandatory and discretionary ac-
cess control policies.
ACM Transactions on
Information and System Security
,
3
(2), 85-206.
doi:10.1145/354876.354878
Denning, D. E., & Schlorer, J. (1983, July). In-
ference controls for statistical databases.
IEEE
Computer
.
Fernández-Medina, E., Trujillo, J., Villarroel, R.,
& Piattini, M. (2006). Access control and audit
model for the multidimensional modeling of data
warehouses.
Decision Support Systems
,
42
(3),
1270-1289. doi:10.1016/j.dss.2005.10.008
Search WWH ::
Custom Search