Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/115790.115796acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article
Free access

Toward a multilevel secure relational data model

Published: 01 April 1991 Publication History
First page of PDF

References

[1]
Dorothy E. Denning, Cryptography and Data SecuriLy. Addison-Wesley, Reading, Mass., (1982).
[2]
Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, and William R. Shockley, "A multilevel relational data model." Proc. IEEE Symposium on Security and Privacy, 220- 234 (1987).
[3]
Patricia P. Griffiths and Bradford W. Wade, =An authorization mechanism for a relational database system." A CM Trans. on Database Systems, (1)3:242-255, (September 1976).
[4]
J. T. Haigh, R. C. O'Brien, and D. J. Thornsen, "The LDV Secure Relational DBMS Model." Database Security IV: Status and Prospects, J ajodin, S. and Landwehr, C. (editors), North-Holland, 1991, to appear.
[5]
Sushil Jajodia and Ravi Sandhu, "Polyinstantiation integrity in multilevel relations." Proc. IEEE Symposium on Security and Privacy, 104-115 (May 1990).
[6]
Sushil J ajodia and Ravi Sandhu, "Database security: Current status and key issues," A CM SIG- MOD Record, (19)4:123-126 (December 1990).
[7]
Sushil Jajodia, Ravi Sandhu, and Edgar Sibley, "Update semantics of multilevel relations." Proc. 6th Annual Computer Security Applications Conf., December 1990, pages 103-112.
[8]
B. W. Lampson, "A note on the confinement problem." CA CM, (16)10:613-615, (October 1973).
[9]
Carl E. Landwehr, "Formal models for computer security." A CM Computing Surveys, (13)3:247- 278 (September 1981).
[10]
Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, and William R. Shockley, "The SeaView security model." IEEE Transactions on Software Engineering, 16(6):593-607 (1990).
[11]
Teresa F. Lust and Donovan Hsieh, "Update semantics for a multilevel relational database." Database Security IV: Status and Prospects, J ajodin, S. and Landwehr, C. (editors), North-Holland, 1991, to appear.
[12]
Fausto Rabitti, Darrell Woelk, and Won Kim, "A model of authorization for object-oriented and semantic databases." Proc Conf. on Eztendin9 Database Technology, 231-250, (March 1988).
[13]
Ravi Sandhu, Sushil Jajodia, and Teresa Lunt, "A new polyinstantiation integrity constraint for multilevel relations." Proc. IEEE Workshop on Computer Security Foundations, 159-165 (June 1990).

Cited By

View all
  • (2021)Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based ModelsInformation Systems Frontiers10.1007/s10796-021-10178-wOnline publication date: 13-Aug-2021
  • (2015)Enforcement of Autonomous Authorizations in Collaborative Distributed Query EvaluationIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2014.235701827:4(979-992)Online publication date: 1-Apr-2015
  • (2013)Privacy and Security in e-Health ApplicationsUser-Driven Healthcare10.4018/978-1-4666-2770-3.ch058(1141-1166)Online publication date: 2013
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '91: Proceedings of the 1991 ACM SIGMOD international conference on Management of data
April 1991
452 pages
ISBN:0897914252
DOI:10.1145/115790
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 1991

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGMOD/PODS91
SIGMOD/PODS91: SIGMOD/PODS 91
May 29 - 31, 1991
Colorado, Denver, USA

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)142
  • Downloads (Last 6 weeks)18
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based ModelsInformation Systems Frontiers10.1007/s10796-021-10178-wOnline publication date: 13-Aug-2021
  • (2015)Enforcement of Autonomous Authorizations in Collaborative Distributed Query EvaluationIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2014.235701827:4(979-992)Online publication date: 1-Apr-2015
  • (2013)Privacy and Security in e-Health ApplicationsUser-Driven Healthcare10.4018/978-1-4666-2770-3.ch058(1141-1166)Online publication date: 2013
  • (2012)Tradeoff Analysis of Relational Database Storage of Privacy PreferencesSecure Data Management10.1007/978-3-642-32873-2_1(1-13)Online publication date: 2012
  • (2012)BTAProceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III10.1007/978-3-642-31137-6_52(682-697)Online publication date: 18-Jun-2012
  • (2011)Inference-proof view update transactions with forwarded refreshmentsJournal of Computer Security10.5555/2011016.201102019:3(487-529)Online publication date: 1-Aug-2011
  • (2011)Privacy and Security in e-Health ApplicationsE-Health, Assistive Technologies and Applications for Assisted Living10.4018/978-1-60960-469-1.ch002(23-48)Online publication date: 2011
  • (2011)eHCBACProceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2011.97(745-750)Online publication date: 16-Nov-2011
  • (2011)Privacy Preserving Models of k-NN AlgorithmComputer Recognition Systems 410.1007/978-3-642-20320-6_22(207-217)Online publication date: 2011
  • (2010)Efficient inference control for open relational queriesProceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy10.5555/1875947.1875962(162-176)Online publication date: 21-Jun-2010
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media