نتایج جستجو برای: multilevel security

تعداد نتایج: 204436  

1993
Ravi S. Sandhu Sushil Jajodia

This paper studies referential integrity in multilevel relations with element-level labeling. Our principal contribution is resolution of an impasse left by previous work in this area. We show that the previous work leaves us with a choice of either accepting referential ambiguity, or severely curtailing the modeling power of multilevel relations. We then show how to escape this impasse by elim...

2006
Bei Wang Jim Alves-Foss

The use of security policy enforcement mechanisms has been a topic in recent literature. Particular focus has been on the class of policies that can be enforced by these mechanisms but not on the security policy guiding the execution of the monitoring mechanisms. It has been a challenge to enforce information confidentiality in a multi-level secure system since malicious users can exploit cover...

2005
Fiona Steele

Steele et al. (2005) describe a general framework for the analysis of correlated event histories, with an application to a study of partnership transitions and fertility among a cohort of British women. A multilevel multistate competing risks model is used to examine the relationship between prior fertility outcomes (the presence and characteristics of children and current pregnancy) and the di...

1996
Vijayalakshmi Atluri Sushil Jajodia Thomas F. Keefe Catherine D. McCollum Ravi Mukkamala

Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the database research community. Transaction processing in these systems requires modiication of conventional scheduling algorithms and commit protocols. These modiications are necessary because preserving the usual transaction properties when transaction...

1994
Simon N. Foley

Reeexive ow policies provide abstract characterizations of certain multilevel conndentiality requirements. This paper describes how reeexive ow policies can be used to construct and reason about large/complex multilevel policies. In particular, we describe how reeexive policies can be used to develop and reason about security policies for multilevel relational databases. Our approach facilitate...

1993
Günther Pernul Werner Winiwarter A Min Tjoa

A design environment for security critical database applications that should be implemented by using multilevel technology is proposed. For this purpose, the Entity-Relationship model is extended to capture security semantics. Important security semantics are defined and a language to express them in an ER model by means of security constraints is developed. The main contribution consists of th...

2004
Bhavani Thuraisingham

In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification p...

2004
Walid Rjaibi

Multilevel Security (MLS) is a capability that allows information with different classifications to be available in an information system, with users having different security clearances and authorizations, while preventing users from accessing information for which they are not cleared or authorized. It is a security policy that has grown out of research and development efforts funded mostly b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید