Module:
Database Security
Created: July 14, 2003
Last Updated: March 11, 2004
- Bishop, Matt. Computer Security: Art and Science.
Addison Wesley, 2002.
- Pfleeger, Charles P, Shari Lawrence Pfleeger, and Willis H.
Ware. Security in Computing, Third Edition. Prentice Hall, 2002.
- Rescorla, Eric. SSL and TLS: Designing and Building Secure Systems.
Addison Wesley Professional, 2001.
- Viega, John and Gary McGraw. Building Secure Software: How to Avoid
Security Problems the Right Way. Addison Wesley. 2002.
- Dorothy E. Denning, Peter J. Denning: Data Security. ACM
Computing Surveys 11(3): 227-249 (1979)
- Parker D.B. (1984). The many faces of data vulnerability.
IEEE Spectrum, 21(5)
- David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases:
Protection Against User Influence. TODS 4(1): 97-106 (1979)
- Denning F.J. ed. (1990). Computers under Attack: Intruders,
Worms, and Viruses. Addison-Wesley
- Saltzer J.D. and Schroeder M.D. (1975). The protection of information in
computer systems. Proc. IEEE, 63(9)
- Fernandez E.B., Summers R.C. and Wood C. (1981). Database
Security and Integrity. Addison-Wesley
- Denning D.E. (1982). Cryptography and Data Security.
Addison-Wesley
- Perry W.E. (1982). Developing a computer security and control strategy.
Computers & Security, Elsevier Science (North-Holland), 1(1)
- Wood C., summersR. C. and Fernandez E. B. (1979).
Authorization in multi- level database models. Information Systems, Pergamon
Press, 4(2)
- Denning D.E. et al. (1988). The Sea View security model. In Proc. IEEE
Symp. on Security and Privacy, Oakland, CA, April 1988
- Jajodia S. and Sandhu R. (1991a). Toward a multilevel relational data
model. In
Proc. ACM-SIGMOD Conf, Denver, CO, May 1991
- T. Y. Lin: Bell and LaPadula Axioms: A “New” Paradigm for an “Old” Model,
Proceedings on the 1992-1993 workshop on New security paradigms (1993)