Databases Reference
In-Depth Information
[42]
Bertino, E., Data Security, Data & Knowledge Engineering, Vol. 25, No. 1–2,
Mar. 1998, pp. 199–216.
[43]
Bertino, E., E. Ferrari, and V. Atluri, The Specification and Enforcement of Authori-
zation Constraints in Workflow Management Systems, ACM Trans. on Information
Systems and Security, Vol. 2, No. 1, Feb. 1999, pp. 65–104.
[44]
Bertino, E., et al., Controlled Access and Dissemination of XML Documents, Proc.
2nd ACM Workshop on Web Information and Data Management (WIDM99), Kansas
City, MO, Nov. 1999.
Selected Bibliography
The topic by Castano et al. [6] covers most of the aspects related to DB secu-
rity, such as mandatory and DAC models, secure DB design, statistical DB
security, and intrusion detection. An overview of DAC models can be found
in the article by Bertino [42], which also provides a discussion of future
research directions. Finally, more details on MAC can be found in the papers
by Thuraisingham [27, 34, 37].
Search WWH ::




Custom Search