1. DBSec 1987:
Annapolis,
Maryland,
USA
Carl E. Landwehr (Ed.):
Database Security:
Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting,
Annapolis,
Maryland,
October 1987. North-Holland 1988,
ISBN 0-444-70479-5
Introductory and General
How Should DBMS Security Policy Requirements be Expressed?
Which Threats can Currently be Countered and How?
How Can Secrecy and Integrity Requirements be Resolved?
What Design and Implementation Methods are Best for Security?
How Should DBMS and OS Security Measures be Related?
- Ronda R. Henning:
The Allocation of Database Management System Security Responsibilities.
131-148
- David L. Spooner:
Relationships between database System and Operating System Security.
149-158
How Can User Inference be Modeled and Controlled?
- Norman S. Matloff:
Inference Control Via Query Restriction Vs. Data Modification: A Perspective.
159-166
- Lawrence H. Cox:
Modelling and Controlling User Inference.
167-171
How Can Application-Dependent Requirements be Enforced?
How Can Individual Accountability be Provided?
- David A. Bonyun:
Logging and Accountability in Database Management Systems.
223-227
How Can We Know the Controls Implemented Meet the Specifications?
- Richard A. Kemmerer:
Formal Specification and Verification Techniques for Secure Database Systems.
229-240
- Rae K. Burns:
Operational Assurance for a Trusted DBMS.
241-251
How do Distributed System Architectures Affect Database Security?
- Glenn H. MacEwen:
Effects of Distributed System Technology on Database Security: A Survey.
253-261
Other Topics
Copyright © Sun Mar 14 23:00:25 2010
by Michael Ley (ley@uni-trier.de)