Looking back at the Bell-La Padula model

DE Bell - 21st Annual Computer Security Applications …, 2005 - ieeexplore.ieee.org
The Bell-La Padula security model produced conceptual tools for the analysis and design of
secure computer systems. Together with its sibling engineering initiatives, it identified and …

k-anonymity: A model for protecting privacy

L Sweeney - International journal of uncertainty, fuzziness and …, 2002 - World Scientific
Consider a data holder, such as a hospital or a bank, that has a privately held collection of
person-specific, field structured data. Suppose the data holder wants to share a version of …

The SeaView security model

TF Lunt, DE Denning, RR Schell… - IEEE Transactions …, 1990 - ieeexplore.ieee.org
A multilevel database is intended to provide the security needed for database systems that
contain data at a variety of classifications and serve a set of users having different …

[PDF][PDF] Toward a multilevel secure relational data model

S Jajodia, R Sandhu - ACM SIGMOD Record, 1991 - dl.acm.org
Although there are several efforts underway to build multilevel secure relational database
management systems, there is no clear consensus regarding what a multilevel secure …

Point-based temporal extensions of SQL and their efficient implementation

D Toman - Temporal databases: research and practice, 2006 - Springer
This chapter introduces a new approach to temporal extensions of SQL. In contrast with most
of the current proposals we use single time points as references to time, while still achieving …

[图书][B] Private lives and public policies: Confidentiality and accessibility of government statistics

VA de Wolf, TB Jabine, GT Duncan - 1993 - books.google.com
Americans are increasingly concerned about the privacy of personal dataâ€" yet we demand
more and more information for public decision making. This volume explores the seeming …

[PDF][PDF] Design of LDV: A multilevel secure relational database management system

PD Stachour, B Thuraisingham - IEEE Transactions on Knowledge …, 1990 - utdallas.edu
In a multilevel secure database management system (MLS/DBMS) users cleared at different
security levels access and share a database consisting of data at a variety of sensitivity …

Foundations of secure deductive databases

PA Bonatti, S Kraus… - IEEE Transactions on …, 1995 - ieeexplore.ieee.org
We develop a formal logical foundation for secure deductive databases. This logical
foundation is based on an extended logic involving several modal operators. We develop …

A 3-D split manufacturing approach to trustworthy system development

J Valamehr, T Sherwood, R Kastner… - … on Computer-Aided …, 2013 - ieeexplore.ieee.org
Securing the supply chain of integrated circuits is of utmost importance to computer security.
In addition to counterfeit microelectronics, the theft or malicious modification of designs in …

Controlling FD and MVD inferences in multilevel relational database systems

TA Su, G Ozsoyoglu - IEEE Transactions on Knowledge and …, 1991 - ieeexplore.ieee.org
The authors investigate the inference problems due to functional dependencies (FD) and
multivalued dependencies (MVD) in a multilevel relational database (MDB) with attribute …