Extensible and Reusable Role-Based Object-Oriented Security.
Steven A. DemurjianT. C. TingMargaretha W. PriceM.-Y. HuPublished in: DBSec (1996)
Keyphrases
- object oriented
- access control
- object oriented software
- data model
- programming language
- database applications
- access control systems
- role assignment
- role based access control
- query language
- computer security
- relational databases
- security requirements
- security policies
- network security
- database schema
- database design
- security issues
- software engineering
- information security
- object oriented programming
- intrusion detection
- security level
- security problems
- statistical databases
- security mechanisms
- design patterns
- object oriented databases
- security protocols
- data security
- security model
- security threats
- access control models
- object oriented modeling
- data mining
- cloud computing
- security measures
- cyber security
- security analysis