Skip to Main Content
We have indicated some of the wide range of security policies an enterprise may wish to implement, and we have described models that could be used in designing a data base systemfl exible enough to support many of those security policies. Additionally, we have shown how models can be used for the formal specification of data base access rules and in comparing the security features of existing data base systems.
Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.