ACM SIGMOD Anthology TKDE dblp.uni-trier.de

Information Flow Control in Object-Oriented Systems.

Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia: Information Flow Control in Object-Oriented Systems. IEEE Trans. Knowl. Data Eng. 9(4): 524-538(1997)
@article{DBLP:journals/tkde/SamaratiBCJ97,
  author    = {Pierangela Samarati and
               Elisa Bertino and
               Alessandro Ciampichetti and
               Sushil Jajodia},
  title     = {Information Flow Control in Object-Oriented Systems},
  journal   = {IEEE Trans. Knowl. Data Eng.},
  volume    = {9},
  number    = {4},
  year      = {1997},
  pages     = {524-538},
  ee        = {db/journals/tkde/SamaratiBCJ97.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

Abstract

Copyright © 1997 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.



References

[1]
...
[2]
...
[3]
...
[4]
Silvana Castano, Maria Grazia Fugini, Giancarlo Martella, Pierangela Samarati: Database Security. Addison-Wesley & ACM Press 1995, ISBN 0-201-59375-0
Contents CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[5]
R. G. G. Cattell: Object Data Management: Object-Oriented and Extended Relational Database Systems (Revised Edition). Addison-Wesley 1994, ISBN 0-201-54748-1
CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[6]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[7]
...
[8]
Sushil Jajodia, Boris Kogan: Integrating an Object-Oriented Data Model with Multilevel Security. IEEE Symposium on Security and Privacy 1990: 76-85 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[9]
Myong H. Kang, Ira S. Moskowitz: A Pump for Rapid, Reliable, Secure Communication. ACM Conference on Computer and Communications Security 1993: 119-129 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[10]
Paul A. Karger: Limiting the Damage Potential of Discretionary Trojan Horses. IEEE Symposium on Security and Privacy 1987: 32-37 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[11]
Udo Kelter: Discretionary Access Controls in a High-Performance Object Management System. IEEE Symposium on Security and Privacy 1991: 288-299 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[12]
Frank Manola, Gail Mitchell: A Comparison of Object Models in ODBMS-Related Standards. IEEE Data Eng. Bull. 17(4): 27-35(1994) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[13]
Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo: Beyond the Pale of MAC and DAC-Defining New Forms of Access Control. IEEE Symposium on Security and Privacy 1990: 190-200 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[14]
Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[15]
...
[16]
...
[17]
A. L. Wilkinson, D. H. Anderson, D. P. Chang, Lee Kock Hin, A. J. Mayo, I. T. Viney, R. Williams, W. Wright: A Penetration Analysis of a Burroughs Large System. Operating Systems Review 15(1): 14-25(1981) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML

Copyright © Fri Mar 12 17:33:43 2010 by Michael Ley (ley@uni-trier.de)