Sciweavers

16 search results - page 3 / 4
» Determining the Structural Events That May Violate an Integr...
Sort
View
ESORICS
1998
Springer
13 years 10 months ago
Rules for Designing Multilevel Object-Oriented Databases
When implementing a multilevel security policy for Object-Oriented Databases (OODBs), several aspects have to be investigated. One of these aspect is the design of multilevel OODB...
Frédéric Cuppens, Alban Gabillon
ICDE
1995
IEEE
99views Database» more  ICDE 1995»
14 years 7 months ago
Record Subtyping in Flexible Relations by Means of Attribute Dependencies
The model of flexible relations supports heterogeneous sets of tuples in a strongly typed way. The elegance of the standard relational model is preserved by using a single, generi...
Christian Kalus, Peter Dadam
ECOOPW
1999
Springer
13 years 10 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
SADFE
2008
IEEE
14 years 4 days ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
OPODIS
2004
13 years 7 months ago
Embedded Systems - Challenges and Work Directions
Embedded Systems are components integrating software and hardware jointly and specifically designed to provide given functionalities. These components may be used in many different...
Joseph Sifakis