首页 > 最新文献

1980 IEEE Symposium on Security and Privacy最新文献

英文 中文
Program Committee 项目委员会
Pub Date : 2023-02-01 DOI: 10.1109/DEPCOS-RELCOMEX.2006.42
C. Nunes
Alessandro Garcia (PUC-Rio, Brazil) Alexandre Alvaro (UFSCar-Sorocaba, Brazil) Alexandre Correa (Unirio, Brazil) Aline Vasconcelos (IFF, Brazil) Ana Paula Bacelo (PUCRS, Brazil) Andres Diaz-Pace (UNICEN, Argentina) Antonio Francisco Prado (UFSCar, Brazil) Arndt von Staa (PUC-Rio, Brazil) Camila Nunes (GE Global Research Center, Brazil) Cecilia Rubira (Unicamp, Brazil) Christina Chavez (UFBA, Brazil) Claudia Werner (COPPE/UFRJ, Brazil) Cláudio Sant’Anna (UFBA, Brazil) Dalton Serey (UFCG, Brazil) Daniel Lucrédio (UFSCar, Brazil) David Weiss (Iowa State University, USA) Edson Oliveira Junior (UEM, Brazil) Eduardo Almeida (UFBA, Brazil) Eduardo Guerra (INPE, Brazil) Elder Cirilo (PUC-Rio, Brazil) Elisa Yumi Nakagawa (ICMC-USP, Brazil) Ellen Francine Barbosa (ICMC-USP, Brazil) Fabiano Ferrari (UFSCar, Brazil) Fernando Castor (UFPE, Brazil) Flavia Delicato (UFRJ, Brazil) Flavio Oquendo (European University of Brittany/IRISA-UBS, France) Franklin Ramalho (UFCG, Brazil) Genaina Rodrigues (UnB, Brazil) Gibeon Aquino (UFRN, Brazil) Gledson Elias (UFPB, Brazil) Guilherme Travassos (COPPE/UFRJ, Brazil) Ingrid Nunes (UFRGS, Brazil) Itana Maria de Souza Gimenes (UEM, Brazil) Jaejoon Lee (Lancaster University, UK) Jeffrey Poulin (Lockheed Martin, USA) Jobson Massollar (COPPE/UFRJ, Brazil) John McGregor (Clemson University, USA) José Maldonado (ICMC-USP, Brazil) Kiev Gama (UFPE, Brazil) Leonardo Murta (UFF, Brazil) Lidia Fuentes (University of Málaga, Spain) Lucineia Thom (UFRGS, Brazil) Marcelo Eler (EACH-USP, Brazil) Marcelo Fantinato (EACH-USP, Brazil)
{"title":"Program Committee","authors":"C. Nunes","doi":"10.1109/DEPCOS-RELCOMEX.2006.42","DOIUrl":"https://doi.org/10.1109/DEPCOS-RELCOMEX.2006.42","url":null,"abstract":"Alessandro Garcia (PUC-Rio, Brazil) Alexandre Alvaro (UFSCar-Sorocaba, Brazil) Alexandre Correa (Unirio, Brazil) Aline Vasconcelos (IFF, Brazil) Ana Paula Bacelo (PUCRS, Brazil) Andres Diaz-Pace (UNICEN, Argentina) Antonio Francisco Prado (UFSCar, Brazil) Arndt von Staa (PUC-Rio, Brazil) Camila Nunes (GE Global Research Center, Brazil) Cecilia Rubira (Unicamp, Brazil) Christina Chavez (UFBA, Brazil) Claudia Werner (COPPE/UFRJ, Brazil) Cláudio Sant’Anna (UFBA, Brazil) Dalton Serey (UFCG, Brazil) Daniel Lucrédio (UFSCar, Brazil) David Weiss (Iowa State University, USA) Edson Oliveira Junior (UEM, Brazil) Eduardo Almeida (UFBA, Brazil) Eduardo Guerra (INPE, Brazil) Elder Cirilo (PUC-Rio, Brazil) Elisa Yumi Nakagawa (ICMC-USP, Brazil) Ellen Francine Barbosa (ICMC-USP, Brazil) Fabiano Ferrari (UFSCar, Brazil) Fernando Castor (UFPE, Brazil) Flavia Delicato (UFRJ, Brazil) Flavio Oquendo (European University of Brittany/IRISA-UBS, France) Franklin Ramalho (UFCG, Brazil) Genaina Rodrigues (UnB, Brazil) Gibeon Aquino (UFRN, Brazil) Gledson Elias (UFPB, Brazil) Guilherme Travassos (COPPE/UFRJ, Brazil) Ingrid Nunes (UFRGS, Brazil) Itana Maria de Souza Gimenes (UEM, Brazil) Jaejoon Lee (Lancaster University, UK) Jeffrey Poulin (Lockheed Martin, USA) Jobson Massollar (COPPE/UFRJ, Brazil) John McGregor (Clemson University, USA) José Maldonado (ICMC-USP, Brazil) Kiev Gama (UFPE, Brazil) Leonardo Murta (UFF, Brazil) Lidia Fuentes (University of Málaga, Spain) Lucineia Thom (UFRGS, Brazil) Marcelo Eler (EACH-USP, Brazil) Marcelo Fantinato (EACH-USP, Brazil)","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115257549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Secure Relational Database Management System Kernel: Three Years After 安全关系数据库管理系统内核:三年之后
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10008
D. Bonyun
A brief look back at the project undertaken by I.P. Sharp Associates for the U.S. Air Force and the Canadian Government on Relational DBMS Kernel design. Since the completion of the project, 3 years ago, several changes have occurred which alter our perception of the project and its results. A quick look at the future in this area is included.
简要回顾一下I.P. Sharp Associates为美国空军和加拿大政府所承担的关于关系DBMS内核设计的项目。自3年前项目完成以来,发生了一些变化,改变了我们对项目及其结果的看法。本文还包括对该领域未来的快速展望。
{"title":"The Secure Relational Database Management System Kernel: Three Years After","authors":"D. Bonyun","doi":"10.1109/SP.1980.10008","DOIUrl":"https://doi.org/10.1109/SP.1980.10008","url":null,"abstract":"A brief look back at the project undertaken by I.P. Sharp Associates for the U.S. Air Force and the Canadian Government on Relational DBMS Kernel design. Since the completion of the project, 3 years ago, several changes have occurred which alter our perception of the project and its results. A quick look at the future in this area is included.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116916453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards a Fail-Safe Approach to Secure Databases 迈向故障安全的方法来保护数据库
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10018
T. D. Friedman, L. J. Hoffman
In this paper we consider some problems related to database security. We first generalize the definition of compromise to the discovery of the value of some (generally complex) property about a class of individuals. For a given query we define implied queries and impose tests for safe response on both the query and implied queries. It is shown how this approach relates to the "tracker" concept. It is further shown how this approach mitigates to some extent the security problems related to history keeping and to user preknowledge of the database.
本文对数据库安全相关问题进行了研究。我们首先将妥协的定义推广到发现关于一类个体的某些(通常是复杂的)性质的值。对于给定查询,我们定义隐含查询,并对查询和隐含查询进行安全响应测试。它显示了这种方法与“跟踪器”概念的关系。进一步说明了这种方法如何在一定程度上减轻与历史记录保存和用户预知数据库相关的安全问题。
{"title":"Towards a Fail-Safe Approach to Secure Databases","authors":"T. D. Friedman, L. J. Hoffman","doi":"10.1109/SP.1980.10018","DOIUrl":"https://doi.org/10.1109/SP.1980.10018","url":null,"abstract":"In this paper we consider some problems related to database security. We first generalize the definition of compromise to the discovery of the value of some (generally complex) property about a class of individuals. For a given query we define implied queries and impose tests for safe response on both the query and implied queries. It is shown how this approach relates to the \"tracker\" concept. It is further shown how this approach mitigates to some extent the security problems related to history keeping and to user preknowledge of the database.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122656842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An Overview of Transborder Data Flow Issues 跨界数据流问题概述
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10010
R. Turn
Included in the scope of the term "transborder data flows is the transmission over computer-communicational systems of automated data to be processed and stored in foreign data processing systems. A number of issues, including privacy protection and data security, arise in various transborder data flow (TDF) situations and are discussed in this paper, especially the potential effects on TDF of national privacy protection laws and pending international agreements. Sets of associated technical requirements are examined.
“跨界数据流”一词的范围包括通过计算机通信系统传输将在外国数据处理系统中处理和存储的自动数据。许多问题,包括隐私保护和数据安全,出现在各种跨境数据流(TDF)的情况下,并在本文中进行了讨论,特别是国家隐私保护法和未决的国际协议对TDF的潜在影响。检查相关的技术需求集。
{"title":"An Overview of Transborder Data Flow Issues","authors":"R. Turn","doi":"10.1109/SP.1980.10010","DOIUrl":"https://doi.org/10.1109/SP.1980.10010","url":null,"abstract":"Included in the scope of the term \"transborder data flows is the transmission over computer-communicational systems of automated data to be processed and stored in foreign data processing systems. A number of issues, including privacy protection and data security, arise in various transborder data flow (TDF) situations and are discussed in this paper, especially the potential effects on TDF of national privacy protection laws and pending international agreements. Sets of associated technical requirements are examined.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121060303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Demonstrating Security for Trusted Applications on a Security Kernal Base 在安全内核基础上演示可信应用程序的安全性
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10000
S. R. Ames, James Keeton-Williams
A methodology for demonstrating the security of trusted applications on a security kernel base is presented. The methodology consists of selecting and authenticating security criteria, and demonstrating through verification techniques that the implementation obeys the selected criteria. Difficulties encountered in the placement of a trusted application on top of a security kernel base motivated the development of the methodology.
提出了一种在安全内核基础上演示可信应用程序安全性的方法。该方法包括选择和验证安全标准,并通过验证技术演示实现遵守所选标准。在安全内核基础上放置可信应用程序时遇到的困难促使开发了该方法。
{"title":"Demonstrating Security for Trusted Applications on a Security Kernal Base","authors":"S. R. Ames, James Keeton-Williams","doi":"10.1109/SP.1980.10000","DOIUrl":"https://doi.org/10.1109/SP.1980.10000","url":null,"abstract":"A methodology for demonstrating the security of trusted applications on a security kernel base is presented. The methodology consists of selecting and authenticating security criteria, and demonstrating through verification techniques that the implementation obeys the selected criteria. Difficulties encountered in the placement of a trusted application on top of a security kernel base motivated the development of the methodology.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134517034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Model to Describe Protection Problems 描述保护问题的模型
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10002
G. Kreissig
A protection model based on access control which gives formal definitions for the terms protection problem and safety is introduced. The model provides features for describing the manipulation of the contents of objects and extends the possibilities of the access matrix model.
介绍了一种基于访问控制的保护模型,给出了保护问题和安全的形式化定义。该模型提供了描述对象内容操作的特性,并扩展了访问矩阵模型的可能性。
{"title":"A Model to Describe Protection Problems","authors":"G. Kreissig","doi":"10.1109/SP.1980.10002","DOIUrl":"https://doi.org/10.1109/SP.1980.10002","url":null,"abstract":"A protection model based on access control which gives formal definitions for the terms protection problem and safety is introduced. The model provides features for describing the manipulation of the contents of objects and extends the possibilities of the access matrix model.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Difficulty of Computing Logarithms Over GF (q^m) GF (q^m)上对数计算的难度
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10015
M. Hellman
In “New Directions in Cryptography”, Diffie and Hellman propose a public key distribution (PKD) system based on exponentiation in a discrete arithmetic system. The security of this technique is crucially dependent on the difficulty of computing discrete logarithms (the inverse of the discrete exponential function). Until recently, the best known method for computing discrete logs required running time which grew exponentially in the word size. However, Adleman has recently observed that certain fast algorithms for factoring integers are also applicable to computing discrete logs over GF(q), the Galois field with q elements (q denotes a prime number). He also noted that the running time for the modified algorithm should be of the same form as for factoring, namely
在《密码学的新方向》中,Diffie和Hellman提出了一种基于离散算术系统中幂的公钥分发(PKD)系统。该技术的安全性主要依赖于计算离散对数(离散指数函数的逆)的难度。直到最近,最著名的计算离散对数的方法需要运行时间,而运行时间在字长上呈指数级增长。然而,Adleman最近观察到,用于分解整数的某些快速算法也适用于计算GF(q)上的离散对数,GF(q)是具有q个元素的伽罗瓦域(q表示素数)。他还指出,修改后的算法的运行时间应该与因式分解的形式相同,即
{"title":"On the Difficulty of Computing Logarithms Over GF (q^m)","authors":"M. Hellman","doi":"10.1109/SP.1980.10015","DOIUrl":"https://doi.org/10.1109/SP.1980.10015","url":null,"abstract":"In “New Directions in Cryptography”, Diffie and Hellman propose a public key distribution (PKD) system based on exponentiation in a discrete arithmetic system. The security of this technique is crucially dependent on the difficulty of computing discrete logarithms (the inverse of the discrete exponential function). Until recently, the best known method for computing discrete logs required running time which grew exponentially in the word size. However, Adleman has recently observed that certain fast algorithms for factoring integers are also applicable to computing discrete logs over GF(q), the Galois field with q elements (q denotes a prime number). He also noted that the running time for the modified algorithm should be of the same form as for factoring, namely","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130582774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Data-Swapping: The First Steps 实用数据交换:第一步
Pub Date : 1980-04-14 DOI: 10.1145/348.349
S. Reiss
The problem of statistical database confidentiality in releasing microdata is addressed through the use of approximate data-swapping. Here a portion of the microdata is replaced with a database that has been selected with approximately the same statistics. The result guarantees the confidentialityof the original data, while providing microdata with accurate statistics. Methods for achieving such transformations are considered and analyzed through simulation.
通过使用近似数据交换解决了发布微数据时统计数据库的保密性问题。在这里,微数据的一部分被替换为具有大致相同统计信息的数据库。结果保证了原始数据的保密性,同时为微数据提供了准确的统计。通过仿真分析了实现这种转换的方法。
{"title":"Practical Data-Swapping: The First Steps","authors":"S. Reiss","doi":"10.1145/348.349","DOIUrl":"https://doi.org/10.1145/348.349","url":null,"abstract":"The problem of statistical database confidentiality in releasing microdata is addressed through the use of approximate data-swapping. Here a portion of the microdata is replaced with a database that has been selected with approximately the same statistics. The result guarantees the confidentialityof the original data, while providing microdata with accurate statistics. Methods for achieving such transformations are considered and analyzed through simulation.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121459862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 174
A Module Definition Facility for Access Control in Distributed Data Base Systems 分布式数据库系统访问控制的模块定义工具
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10012
R. V. D. Riet, M. Kersten, A. Wasserman
Future information systems will involve the interconnection of databases through public networks, requiring the development of adequate security facilities within the local nodes in order to prevent unauthorized access and use of data. A key component of any security scheme is a set of lanuage primitives that define access rights; these language primitives must be combined with other language facilities that assure integrity of the data bases involved and that promote the development of reliable software systems. In such an environment, transaction-based systems, providing interactive access to stored data through a set of predefined operations, may be implemented with programming languages containing facilities for data base definition and manipulation. In such a case, it is necessary to provide some primitives for access control within the programming language. This paper presents a set of such primitives, embedded in a module definition facility, that permits defferent classes of users to share a data base in a controlled way. These facilities are presented as a possible set of extensions to the programming language PLAIN.
未来的信息系统将涉及通过公共网络连接数据库,需要在当地节点内发展适当的安全设施,以防止未经授权的访问和使用数据。任何安全方案的关键组成部分都是一组定义访问权限的语言原语;这些语言原语必须与其他语言设施结合起来,以确保所涉及的数据库的完整性,并促进可靠软件系统的开发。在这样的环境中,基于事务的系统(通过一组预定义的操作提供对存储数据的交互式访问)可以用包含数据库定义和操作工具的编程语言实现。在这种情况下,有必要为编程语言中的访问控制提供一些原语。本文提出了一组这样的原语,嵌入在模块定义工具中,允许不同类型的用户以受控的方式共享数据库。这些功能作为编程语言PLAIN的一组可能的扩展。
{"title":"A Module Definition Facility for Access Control in Distributed Data Base Systems","authors":"R. V. D. Riet, M. Kersten, A. Wasserman","doi":"10.1109/SP.1980.10012","DOIUrl":"https://doi.org/10.1109/SP.1980.10012","url":null,"abstract":"Future information systems will involve the interconnection of databases through public networks, requiring the development of adequate security facilities within the local nodes in order to prevent unauthorized access and use of data. A key component of any security scheme is a set of lanuage primitives that define access rights; these language primitives must be combined with other language facilities that assure integrity of the data bases involved and that promote the development of reliable software systems. In such an environment, transaction-based systems, providing interactive access to stored data through a set of predefined operations, may be implemented with programming languages containing facilities for data base definition and manipulation. In such a case, it is necessary to provide some primitives for access control within the programming language. This paper presents a set of such primitives, embedded in a module definition facility, that permits defferent classes of users to share a data base in a controlled way. These facilities are presented as a possible set of extensions to the programming language PLAIN.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116880202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Aspects of Data Security in General-Purpose Data Base Management Systems 通用数据库管理系统中数据安全的几个方面
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10017
S. Miranda
With the ever-increasing use of computers for storing large volumes of vital data, the problems involved in providing data security have been receiving very great attention from researchers. In this paper we try to investigate the various aspects of data security in a general-purpose Data Base Management System (DBMS). Data security concerns data manipulation which encompasses two phases : retrieval and access (read/write). Privacy protection is associated with the retrieval phase and integrity attached to the modification phase. In this paper, we detail both parts of data security and give an overview of the potential solutions to each feature.
随着计算机存储大量重要数据的使用日益增加,提供数据安全所涉及的问题一直受到研究人员的高度关注。在本文中,我们试图研究通用数据库管理系统(DBMS)中数据安全的各个方面。数据安全涉及数据操作,它包括两个阶段:检索和访问(读/写)。隐私保护与检索阶段相关联,完整性与修改阶段相关联。在本文中,我们详细介绍了数据安全的两个部分,并概述了每个特性的潜在解决方案。
{"title":"Aspects of Data Security in General-Purpose Data Base Management Systems","authors":"S. Miranda","doi":"10.1109/SP.1980.10017","DOIUrl":"https://doi.org/10.1109/SP.1980.10017","url":null,"abstract":"With the ever-increasing use of computers for storing large volumes of vital data, the problems involved in providing data security have been receiving very great attention from researchers. In this paper we try to investigate the various aspects of data security in a general-purpose Data Base Management System (DBMS). Data security concerns data manipulation which encompasses two phases : retrieval and access (read/write). Privacy protection is associated with the retrieval phase and integrity attached to the modification phase. In this paper, we detail both parts of data security and give an overview of the potential solutions to each feature.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127761860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
1980 IEEE Symposium on Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1