1 - 5 of 5 articles
Most information systems which we try to model from a security perspective are implicitly governed by multiple security policies, hereafter called multipolicies. This stems from the fact that these systems generally support people-oriented activities which have different security relevant...
Metapolicies, or "policies about policies", may become a powerful concept for developing the large, complex, and interrelated trusted systems that military, commercial and non-profit organizations need today. Metapolicies provide a framework for clarifying policies and for successfully...
We describe issues on interconnecting trusted database management systems. In particular, issues on handling heterogeneity and autonomy are discussed.
To establish a basis for discussion of security and privacy for data management, a few fundamental notions need to be defined. In its most general interpretation a database is a structured collection of information. A data management system is intended as a unique means of providing access to...
This article outlines some of the basic principles involved in the design and administration of a secure transaction service for a database system. Specifically it discusses the case in which the database also maintains personal details of the users in order to facilitate real time user...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.