Database Reference
In-Depth Information
REFERENCES
Ferraiolo, D. F., & Kuhn, R. (1992, October).
Role-based access control (rbac). In Proc. 15th
NIST-NSA National Computer Security Confer-
ence . Baltimore, MD.
Adam, N. R., & Worthmann, J. C. (1989). Security-
control methods for statistical databases: A com-
parative study. ACM Computing Surveys , 21 (4),
515-556. doi:10.1145/76894.76895
Guimaraes, M. (2006). New challenges in teaching
database security. In InfoSecCD '06: Proceedings
of the 3rd annual conference on Information se-
curity curriculum development (pp. 64-67). New
York: ACM.
Aggarwal, C. C. (2005). On k-anonymity and the
curse of dimensionality. In Proceedings of the 31st
VLDB Conference .
Avizienis, A., Laprie, J.-C., Randell, B., &
Landwehr, C. (2004). Basic concepts and tax-
onomy of dependable and secure computing. IEEE
Transactions on Dependable and Secure Comput-
ing , 1 (1), 11-33. doi:10.1109/TDSC.2004.2
Landwehr, C. E. (2001). Computer security.
International Journal of Information Security ,
1 (1), 3-13.
Loukides, G., & Shao, J. (2007). Capturing data
usefulness and privacy protection in k-anonymis-
ation. In SAC '07: Proceedings of the 2007 ACM
symposium on Applied computing (pp. 370-374).
New York: ACM.
Bell, D., & La Padula, L. (1975). Secure computer
system: Unified exposition and multics interpreta-
tion (Esd-tr-75-306, Technical Report mtr-2997).
Bedford, MA: The MITRE Corporation.
Machanavajjhala,A., Gehrke, J., Kifer, D., & Ven-
kitasubramaniam, M. (2006). L-diversity: Privacy
beyond k -anonymity. In ICDE '06: Proceedings
of the 22nd International Conference on Data
Engineering (ICDE'06) , 24, Washington, DC:
IEEE Computer Society.
Bertino, E., Khan, L. R., Sandhu, R., & Thurais-
ingham, B. (2006, May). Secure knowledge man-
agement: Confidentiality, trust, and privacy. IEEE
Transactions on Systems, Man, and Cybernetics.
Part A, Systems and Humans , 36 (3), 429-438.
doi:10.1109/TSMCA.2006.871796
Mitre Corporation (1997,April). Integrity consid-
erations for secure computer systems. (Technical
Report esdtr-76-372, esd,/afsc, mtr 3153). Bed-
ford, MA: Mitre Corporation.
Castano, S., Martella, G., Samarati, P., & Fugini,
M. (1994). Database Security . Addison-Wesely,
ACM Press.
Denning, D. E. (1982). Cryptography and data
security . Reading, MA: Addison Wesley.
Nyanchama, M., & Osborn, S. (1994). Ifip wg
11.3 working conf. on database security. database
security viii: Status and prospects. In Proc. 15th
Annual Computer Security Applications Confer-
ence . North-Holland.
Denning, D. E., & Denning, P. J. (1979). Data se-
curity. ACM Computing Surveys , 11 (3), 227-249.
doi:10.1145/356778.356782
Osborn, S., Sandhu, R. S., & Munawer, Q.
(2000). Configuring role-based access control
to enforce mandatory and discretionary ac-
cess control policies. ACM Transactions on
Information and System Security , 3 (2), 85-206.
doi:10.1145/354876.354878
Denning, D. E., & Schlorer, J. (1983, July). In-
ference controls for statistical databases. IEEE
Computer .
Fernández-Medina, E., Trujillo, J., Villarroel, R.,
& Piattini, M. (2006). Access control and audit
model for the multidimensional modeling of data
warehouses. Decision Support Systems , 42 (3),
1270-1289. doi:10.1016/j.dss.2005.10.008
Search WWH ::




Custom Search