A tightly secure object-oriented data model using both discretionary and mandatory security methodologies.
Eric MinorSusan V. VrbskyPublished in: ACM Southeast Regional Conference (1997)
Keyphrases
- security issues
- security requirements
- security level
- security measures
- key management
- security mechanisms
- security protocols
- cryptographic protocols
- security analysis
- sensitive data
- object oriented data models
- key agreement protocol
- information security
- smart card
- encryption scheme
- authentication protocol
- security policies
- access control
- user authentication
- data mining
- object oriented databases
- artificial intelligence
- object oriented
- databases
- object oriented database systems
- data model
- database
- logic programming
- database management systems
- software architecture
- integrity constraints
- formal specification