By Topic

Data base security: requirements, policies, and models

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Wood, C. ; IBM Scientific Center, 9045 Lincoln Boulevard, Los Angeles, CA 90045, USA ; Fernandez, E.B. ; Summers, R.C.

We have indicated some of the wide range of security policies an enterprise may wish to implement, and we have described models that could be used in designing a data base systemfl exible enough to support many of those security policies. Additionally, we have shown how models can be used for the formal specification of data base access rules and in comparing the security features of existing data base systems.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Systems Journal  (Volume:19 ,  Issue: 2 )