5th ACIS International Conference on Software Engineering Research, Management &Amp; Applications (SERA 2007) 2007
DOI: 10.1109/sera.2007.17
|View full text |Cite
|
Sign up to set email alerts
|

A Implementation of Object Oriented Database Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Whether Oracle talks about the connection ("Internet"), the combination of servers ("Grid"), or both ("Cloud"), . [1]. Oracle database includes multimedia objects such as images, audio and video and act as object relational DBMS and can compete with Object oriented databases like O2 AND ORION.…”
Section: Why Oracle Case Study?mentioning
confidence: 99%
See 1 more Smart Citation
“…Whether Oracle talks about the connection ("Internet"), the combination of servers ("Grid"), or both ("Cloud"), . [1]. Oracle database includes multimedia objects such as images, audio and video and act as object relational DBMS and can compete with Object oriented databases like O2 AND ORION.…”
Section: Why Oracle Case Study?mentioning
confidence: 99%
“…Mandatory Access Control begins with security labels assigned to all resource objects on the system. These security labels contain two pieces of information -a classification (TOP SECRET > SECRET > CONFIDENTIAL > UNCLASSIFIED) and a category (which is essentially an indication of the management level, department or project to which the object is available) [1][11] [25]. The authors consider two different models: Bell LaPadula model and Biba's model for the illustration of MAC.…”
Section: Mandatory Access Control (Mac)mentioning
confidence: 99%