Login / Signup
A tightly secure object-oriented data model using both discretionary and mandatory security methodologies.
Eric Minor
Susan V. Vrbsky
Published in:
ACM Southeast Regional Conference (1997)
Keyphrases
</>
security issues
security requirements
security level
security measures
key management
security mechanisms
security protocols
cryptographic protocols
security analysis
sensitive data
object oriented data models
key agreement protocol
information security
smart card
encryption scheme
authentication protocol
security policies
access control
user authentication
data mining
object oriented databases
artificial intelligence
object oriented
databases
object oriented database systems
data model
database
logic programming
database management systems
software architecture
integrity constraints
formal specification