Databases Reference
In-Depth Information
References
1. Hacigumus, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted
data in the database-service-provider model. In: Proc. of the ACM SIGMOD
2002, Madison, Wisconsin, USA (2002)
2. Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc.
of 18th International Conference on Data Engineering, San Jose, California, USA
(2002)
3. Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati,
P.: Balancing confidentiality and eciency in untrusted relational DBMSs. In:
Proc. of the 10th ACM Conference on Computer and Communications Security
(CCS03), Washington, DC, USA (2003)
4. Graham, G., Denning, P.: Protection- principles and practice. In: Proc. of
the Spring Jt. Computer Conference. Volume 40., Montvale, NJ, USA (1972)
417-429
5. Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Com-
munications of the SCM 19 (8) (August 1976) 461-471
6. Lampson, B.W.: Protection. ACM Operating Systems Review 8 (1) (January
1974) 18-24
7. Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.: Flexible support for
multiple access control policies. ACM Transaction on Database Systems 26 (2)
(June 2001) 214-260
8. Lunt, T.: Access control policies: Some unanswered questions. In: Proc. of IEEE
Computer Security Foundations Workshop II, Franconia, New Hampshire (1988)
9. Sandhu, R.: Lattice-based access control models. IEEE Computer 26 (11) (1993)
9-19
10. Bell, D., La Padula, L.: Secure computer systems: A mathematical model.
Technical Report MTR-2547, Vol 2, MITRE Corp., Bedford, MA (November
1973)
11. Bell, D., La Padula, L.: Secure computer systems: Mathematical foundations.
Technical Report MTR-2547, Vol 1, MITRE Corp., Bedford, MA (November
1973)
12. Bell, D., La Padula, L.: Secure computer systems: A refinement of the math-
ematical model. Technical Report MTR-2547, Vol 3, MITRE Corp., Bedford,
MA (April 1974)
13. Bell, D., La Padula, L.: Secure computer systems: Unified exposition and multics
interpretation. Technical Report MTR-2997, Vol 4, MITRE Corp., Bedford, MA
(July 1975)
14. Biba, K.J.: Integrity considerations for secure computer systems. MTR-3153
rev., MITRE Corp., Vol 1, Bedford, MA (April 1977)
15. Samarati, P., De Capitani di Vimercati, S.: Access control: Policies, models, and
mechanisms. In Focardi, R., Gorrieri, R., eds.: Foundations of Security Analysis
and Design. LNCS 2171. Springer-Verlag (2001)
16. McLean, J.: Security models. In Marciniak, J., ed.: Encyclopedia of Software
Engineering. John Wiley & Sons (1994)
17. Ferraiolo, D., Kuhn, D.: Role-based access control. In: Proc. of the 15th National
Computer Security Conference. (1992)
18. Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control
models. IEEE Computer 29 (2) (1996) 38-47
Search WWH ::




Custom Search