颂扬本人 发表于 2025-3-25 06:02:47

A principled approach to object deletion and garbage collection in multilevel secure object basesODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.

Pde5-Inhibitors 发表于 2025-3-25 08:29:29

Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databasesd policies for Methods and Inheritance. However, discretionary authorization models do not provide the high assurance required in systems where Information flow is considered a problem. Mandatory models can solve the problem but usually they are too rigid for commercial applications. Therefore discr

FLIT 发表于 2025-3-25 12:05:32

Capability-based primitives for access control in object-oriented systemsommon foundation for access control in object-oriented systems. This paper presents a primitive capability-based access control architecture that can model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Envir

PRE 发表于 2025-3-25 19:46:23

An execution model for multilevel secure workflowsctivities (or tasks) in a workflow, task dependencies are specified among them. In a multilevel secure (MLS) workflow, tasks may belong to different security levels. Ensuring the task dependencies from the tasks at higher security levels to those at lower security level (high-to-low dependencies) ma

conservative 发表于 2025-3-25 21:50:36

Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented auth access controls from a task-oriented perspective than the traditional subject-object one. Access mediation now involves authorizations at various points during the completion of tasks in accordance with some application logic. By taking a task-oriented view of access control and authorizations, TBA

Cirrhosis 发表于 2025-3-26 03:12:44

Alter-egos and Roles — Supporting Workflow Security in Cyberspacefor security. Firstly, since the description of a workflow process explicitly states when which function is to be performed by . security specifications may be automatically derived from such descriptions. Secondly, the derived security specifications have to be enforced. This paper considers these

Affluence 发表于 2025-3-26 06:23:24

A Two-tier Coarse Indexing Scheme for MLS Database Systemse and reducing the storage required for indexing. At the bottom tier, our scheme requires separate single-level indices, one for each partition of the multilevel relation; at the top tier, our scheme requires a . multilevel index consisting of only those key values from the single-level indices that

LAITY 发表于 2025-3-26 09:34:06

http://reply.papertrans.cn/27/2634/263384/263384_28.png

减去 发表于 2025-3-26 12:41:18

A principled approach to object deletion and garbage collection in multilevel secure object basesODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.

诱惑 发表于 2025-3-26 20:20:57

IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/d/image/263384.jpg
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Database Security XI; Status and Prospects T. Y. Lin,Shelly Qian Book 1998 IFIP International Federation for Information Processing 1998 Ac