Implications of multilevel systems on the data dictionary of a secure relational DBMS (English)
- New search for: Jensen, N.R.
- New search for: Jensen, N.R.
In:
Fourth Aerospace Computer Security Applications Conference (IEEE Cat.
;
58-65
;
1988
-
ISBN:
- Conference paper / Print
-
Title:Implications of multilevel systems on the data dictionary of a secure relational DBMS
-
Additional title:Konsequenzen mehrstufiger Systeme auf das Daten-Woerterbuch eines sicheren relationalen Datenbanksystems
-
Contributors:Jensen, N.R. ( author )
-
Published in:
-
Publisher:
- New search for: IEEE Comput. Soc. Press
-
Place of publication:Washington
-
Publication date:1988
-
Size:8 Seiten, 13 Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 0_1
-
Fourth Aerospace Computer Security Applications Conference (IEEE Cat. No.CH2619-5)| 1988
- 2
-
Selective disassembly: a first step towards developing a virus filterGarnett, P.D. et al. | 1988
- 7/11
-
Exploring computer virusesDavis, R. et al. | 1988
- 16
-
Privacy enhanced electronic mailCasey, T.J. / Wilbur, S.R. et al. | 1988
- 22
-
Denial of service flaws in SDI software-an initial assessmentNyberg, K.A. et al. | 1988
- 30
-
Genesis of a secure application: a multilevel secure message preparation workstation demonstrationIrvine, C.E. / Thompson, M.F. / Schell, R.R. / Tao, T.F. / Lessin, R.E. / Wopat, J.R. / BenArieh, E. et al. | 1988
- 37
-
Haystack: an intrusion detection systemSmaha, S.E. et al. | 1988
- 58
-
Implications of multilevel systems on the data dictionary of a secure relational DBMSJensen, N.R. et al. | 1988
- 66
-
Some results from the entity/relationship multilevel secure DBMS projectGajnak, G.E. et al. | 1988
- 72
-
Toward a multilevel relational data languageLunt, T.F. / Schell, R.R. / Shockley, W.R. / Warren, D. et al. | 1988
- 82
-
Making databases secure with TRUDATA technologyKnode, R.B. / Hunt, R.A. et al. | 1988
- 91
-
Implementation design for a kernelized trusted DBMSDavison, J.W. et al. | 1988
- 99
-
Industry and government DBMS security and privacy needs-a comparisonHenning, R.R. et al. | 1988
- 106
-
Maintaining correctness, availability, and unambiguity in trusted database management systemsMeadows, C. / Jajodia, S. et al. | 1988
- 112
-
Inference controls for frequency count tables: an updateCox, L.H. et al. | 1988
- 118
-
Query processing in LDV: a secure database systemDwyer, P. / Onuegbe, E. / Stachour, P. / Thuraisingham, B. et al. | 1988
- 125
-
Identifying and representing the security semantics of an applicationSmith, G.W. et al. | 1988
- 132
-
Secure system development in industry: a perspective from Digital EquipmentGasser, M. / Lipner, S.B. et al. | 1988
- 152
-
Structuring trust in a large general purpose operating systemParker, T.A. et al. | 1988
- 159
-
An alternative implementation of the reference monitor concept (military messaging, secure)King, G. / Smith, W. et al. | 1988
- 167
-
Dual labels revisited (computer security)Graubart, R.D. et al. | 1988
- 173
-
A mandatory access control mechanism for the Unix file systemThomas, T. et al. | 1988
- 180
-
Producing secure digital information systemsGood, D.I. et al. | 1988
- 183
-
Developing secure systems: issues and solutionsFreeman, J. / Neely, R. / Megalo, L. et al. | 1988
- 194
-
A microprocessor design for multilevel securityClifton, D.B. / Fernandez, E.B. et al. | 1988
- 199
-
UNIX Guardians: active user intervention in data protectionDavida, G.I. / Matt, B.J. et al. | 1988
- 205
-
Using CASE tools to improve the security of applications systemsHosmer, H.H. / Merriman, M. et al. | 1988
- 212
-
Retrofitting and developing applications for a trusted computing baseGambel, D. / Walter, S. et al. | 1988
- 216
-
Telling the goodguys: disseminating information on security holesStoll, C. et al. | 1988
- 221
-
On the control and dissemination of information concerning security flaws and their correctionsWiedemann, P.H. et al. | 1988
- 228
-
Security protection based on mission criticalityJohnson, H.L. et al. | 1988
- 233
-
A model for secure distributed computations in a heterogeneous environmentPau-Chen Cheng / Gligor, V.D. et al. | 1988
- 242
-
A multi-level secure message switch with minimal TCB: architectural outline and security analysisLipper, E.H. / Melamed, B. / Morris, R.J.T. / Zave, P. et al. | 1988
- 256
-
Configuring a trusted system using the TNIPowanda, E.J. / Genovese, J.W. et al. | 1988
- 262
-
Design and implementation of a secure terminal gatewayCramer, R. / Ridridge, B. / Schallenmuller, E. / Shockley, W.R. / Schell, R.R. et al. | 1988
- 269
-
The cascading problem for interconnected networksMillen, J.K. / Schwartz, M.W. et al. | 1988
- 275
-
Characterizing network covert storage channelsEggers, K.W. / Mallett, P.W. et al. | 1988
- 282
-
Transaction control expressions for separation of dutiesSandhu, R. et al. | 1988
- 287
-
Providing software integrity using type managersWong, R.M. / Ding, Y.E. et al. | 1988
- 298
-
Integrity controls for military and commercial applicationsJueneman, R.R. et al. | 1988
- 323
-
Ensuring software integrityWeiss, J.D. / Amoroso, E.G. et al. | 1988
- 331
-
The importance of high assurance computers for command, control, communications, and intelligence systemsShockley, W.R. / Schell, R.R. / Thompson, M.F. et al. | 1988
- 362
-
Security issues of the Trusted Mach systemBranstad, M. / Tajalli, H. / Mayer, F. et al. | 1988
- 368
-
An interpretation of a refined Bell-La Padula model for the TMach kernelMayer, F.L. et al. | 1988
- 379
-
Embedding cryptography into a Trusted Mach systemBarker, W.C. / Cochrane, P. / Branstad, M. et al. | 1988
- 386
-
Security modeling in the Ulysses environmentKorelsky, T. / Dean, B. / Eichenlaub, C. / Hook, J. / Klapper, C. / Lam, M. / McCullough, D. / Pottinger, G. / Rambow, O. / Rosenthal, D. et al. | 1988
- 393
-
Minix security policy modelRoskos, J.E. et al. | 1988
- 401
-
A description of a formal verification and validation (FVV) processSmith, B. / Reese, C. / Lindsay, K. / Crane, B. et al. | 1988
- 410
-
Encryption using random keys-a scheme for secure communicationsGoyal, P.K. / Fernandez, E.B. et al. | 1988
- 414
-
Software security evaluation based on a top-down McCall-like approachCopigneaux, F. / Martin, S. et al. | 1988
- 419
-
A taxonomy of the causes of proof failures in applications using the HDM methodologyLindsay, K.S. et al. | 1988
- 426
-
System security in the Space Flight Operations CenterWagner, D.A. et al. | 1988