@string{IEEESec85 = "Proceedings 1985 IEEE Symposium on Security and Privacy"} @string{IEEESec88 = "Proceedings 1988 IEEE Symposium on Security and Privacy"} @string{IEEESec89 = "Proceedings 1989 IEEE Symposium on Security and Privacy"} @incollection {Lu89, author = {Lunt, T. F.}, title = {Access Control Policies for Database Systems}, booktitle = {Database Security}, year = {1989}, editor = {Landwehr, C.E.}, volume = {II}, pages = {41-52} } @incollection {Ln89, author = {Dobson, John E. and McDermid, John A.}, title = {Security Models and Enterprise Models}, booktitle = {Database Security}, year = {1989}, editor = {Landwehr, C. E.}, volume = {II}, pages = {1-39} } @incollection {Lun89, author = {Steinke, G.}, title = {Modelling Security Requirements in Information Systems}, booktitle = {Database Application Engineering with DAIDA}, year = {1989}, editor = {Jarke, M.}, volume = {I}, pages = {201-220} } @article{CJB94, author= {Chang, C.C and Jan, J.K and Buehrer, D.J.}, title= {A scheme to determine the relationship between two users in a hierarchy}, journal= {Computer \& Security}, year= {1994}, volume= {13}, number= {3}, pages= {}, month= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords: groups Registrierung: status: Inhalt: }, } @techreport{Mre78, author= {Mresse, M.}, title= {Identification and Authorization in Data Base Systems}, institution= {IBM Research Division}, year= {1978}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords:Authorization, Identification Registrierung: R6521 status: Inhalt: }, } @techreport{CGGTW77, author= {Chamberlain, D. D. and Gray, J. N. and Griffiths, P. P. and Traiger, I. L. and Wade, B. W.}, title= {Data Base System Authorization}, institution= {IBM Research Division}, year= {1977}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords:Authorization Registrierung:R6097 status: Inhalt: }, } @techreport{WiLi81, author= {Wilms, R. F and Lindsay, B. G.}, title= {A Database Authorization Mechanism supporting individual and group authorization}, institution= {IBM Research Division}, year= {1981}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords:Authorization, Graphics Registrierung:R9028 status: ### USED ### Inhalt: }, } @techreport{GLL89, author= {Gapliardi, R. and Lapis, G. and Lindsay, B.}, title= {A flexible and efficient Database Authorization Facility}, institution= {IBM Research Division}, year= {1989}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords:Authorization, Data Types Registrierung:R21000 status: ### USED ### Inhalt: }, } @inproceedings{San89, author= {Sandhu, Ravi}, title= {Transformation of Access Rights}, booktitle= {Security and Privacy}, year= {1989}, editor= {}, volume= {}, number= {}, series= {}, pages= {259-268}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords:formal model, access rights Registrierung:K SEC 14278 status: Inhalt: }, } @inproceedings{FGS89, author= {Fern{\'a}ndez, E. B. and Gudes, E. and Song, H.}, title= {A Security Model for Object-Oriented Databases}, booktitle= {Security and Privacy}, year= {1989}, editor= {}, volume= {}, number= {}, series= {}, pages= {}, address= {}, month= {}, organization= {}, publisher= {}, owner= {ar-lit}, date= {--19}, comment= {keywords:object-oriented, security model Registrierung:K SEC 14278 status: Inhalt: }, } @techreport{MiLo85, author= {Minsky, N. H. and Lockman, A.}, title= {Extending Authorization by Adding Obligations to Permissions}, institution= {Rutgers University of New Jersey}, year= {1985}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords: Registrierung:R13872 status: Inhalt: }, } @book{Hof82, author= {Hofman, Christoph}, title= {Group-Theoretic Algorithms and Graph Isomorphism}, publisher= {Springer-Verlag}, year= {1982}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords:graph isomorphism Registrierung:T Hof 7238 status: Inhalt: }, } @techreport{Fag77, author= {Fagin, Ronald}, title= {On an Authorization Mechanism}, institution= {IBM Research Division}, year= {1977}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {07101994}, comment= {keywords:Authorization, Revocation, Granting Registrierung:R6094 status: Inhalt: }, } @inproceedings{ABLP93, author= {Abadi, M. and Burrows, M. and Lampson, B.and Plotkin, G.}, title= {A Calculus for Access Control in Distributed Systems}, booktitle= {ACM: Transaction on Programming Languages and Systems}, year= {1993}, editor= {}, volume= {}, number= {}, series= {}, pages= {706-734}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords:formal model, access rights, calculus Registrierung: status: Inhalt: }, } @inproceedings{FFW94, author= {Fern{\'a}ndez, Eduardo B. and Wu, Jie and Fern{\'a}ndez, Minjie H.}, title= {User Group Structures in Object-Oriented Database Authorization}, booktitle= {Database Security}, year= {1994}, editor= {Biskup, J. and Morgenstern, M. and Landwehr, C. E.}, volume= {}, number= {}, series= {}, pages= {}, address= {}, month= {August}, organization= {Universit"at Hildesheim}, publisher= {}, owner= {tk-lit}, date= {31101994}, comment= {keywords:groups Registrierung:R27769 status: Inhalt: }, } @inproceedings{NyOs94, author= {Nyanchama, Matunda and Osborn, Sylvia}, title= {Access Rights Administration In Role-Based Security Systems}, booktitle= {Database Security}, year= {1994}, editor= {Biskup, J. and Morgenstern, M. and Landwehr, C.E.}, volume= {}, number= {}, series= {}, pages= {}, address= {}, month= {August}, organization= {Universit"at Hildesheim}, publisher= {}, owner= {tk-lit}, date= {31101994}, comment= {keywords:groups, roles Registrierung:R27769 status: Inhalt: }, } @inproceedings{BOS94, author= {Bertino, E. and Origgi, F. and Samarati, P.}, title= {A New Authorization Model for Object-Oriented Databases}, booktitle= {Database Security}, year= {1994}, editor= {Biskup, J. and Morgenstern, M. and Landwehr, C.E.}, volume= {}, number= {}, series= {}, pages= {}, address= {}, month= {August}, organization= {Universit"at Hildesheim}, publisher= {}, owner= {tk-lit}, date= {31101994}, comment= {keywords:object-oriented DBMS, authorization Registrierung:R27769 status: Inhalt: }, } @inproceedings{RBKW91, author= {Rabitti, Fausto and Bertino, Elisa and Kim, Won and Woelk, Darrell}, title= {A Model of Authorization for Next-Generation Database Systems}, booktitle= {ACM: Transaction on Database Systems}, year= {1991}, editor= {}, volume= {}, number= {}, series= {}, pages= {88-131}, address= {}, month= {}, organization= {}, publisher= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{MRS94, author= {Rudloff, Andreas and Matthes, Florian and Schmidt, Joachim W.}, title= {Security as an Add-On Quality in Persistent Object Systems}, booktitle= {Second International East/West Database Workshop}, year= {1995}, editor= {Eder, J. and Kalinichenko, L. A.}, volume= {}, number= {}, series= {Workshops in Computing}, pages= {90-108}, address= {Klagenfurt, {\"O}sterreich}, month= {}, organization= {}, publisher= {Springer Verlag}, owner= {tk-lit}, date= {24071995}, comment= {}, } @misc{Kass94, author= {Ka{\ss}, Thomas}, title= {Objektorientierte Datenmodellierung: Ein Klasseneditor zur Entwurfsunterst"utzung}, howpublished= {Studienarbeit am Arbeitsbereich Datenbanken und Informationssysteme der Universit"at Hamburg}, month= {Januar}, year= {1994}, owner= {tk-lit}, date= {1994}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @techreport{BeLa73, author = {Bell, D. E. and LaPadula, L. J.}, address = {Bedford, Massachusetts}, institution = {The MITRE Corporation}, number = {ESD-TR-73-278, Vol. 1}, title = {Secure Computer Systems: Mathematical Foundations}, year = {1973}, OWNER = {ar-lit}, DATE = {before december 1993}, COMMENT = {keywords: multi level security, bell lapadula Registrierung: status: Inhalt: grundlegendes modell fuer multi level security} } @inproceedings{BrNa89, author = {Brewer, D. F. C. and Nash, J. W.}, address = {Oakland, California}, booktitle = IEEESec89, publisher = {IEEE Computer Society Press}, title = {The Chinese Wall Security Policy}, year = {1989}, OWNER = {ar-lit}, DATE = {before december 1993}, COMMENT = {keywords: chinese wall Registrierung: K SEC 14278 status: Inhalt: chinese wall modell - zugriffsberechtigung richtet sich nach den bereits zugegriffenen objekten - modell stammt aus der unternehmensberatung (konkurrenzsituation)} } @article{Mille89, author = {Millen, J. K.}, journal = {Advances in Computers}, pages = {1--45}, title = {Models of Multilevel Computer Security}, volume = {29}, year = {1989}, OWNER = {ar-lit}, DATE = {before december 1993}, COMMENT = {keywords: Registrierung: G ADV 14723 status: Inhalt:} } @manual{TCSECold, edition = {DOD 5200.28-STD}, organization = {Department of Defense}, title = {Trusted Computer System Evaluation Criteria}, year = {1985}, OWNER = {ar-lit}, DATE = {before december 1993}, COMMENT = {keywords: Registrierung: status: Inhalt:} } @inproceedings{DRKJ85, author = {Downs, D. D. and Rub, J. R. and Kung, C. K. and Jordan, C. S.}, booktitle = IEEESec85, key = {DRKJ85}, month = apr, pages= {208--218}, title = {Issues in Discretionary Access Control}, year = {1985}, OWNER = {ar-lit}, DATE = {23-08-1994}, COMMENT = {K SEC 10126, referenz fuer dac, gruppen, capabilities, behauptung dass capabilities nicht gut fuer ein komplettes DAC modell geeignet sind, da genaue rechteverteilung nicht nachvollziehbar ist, s. auch DRKJ85, Forderung nach ``protected subsystems'' (benutzerdefiniert!)} } @inproceedings{Vint88, author = {Vinter, S. T.}, booktitle = IEEESec88, key = {Vint88}, month = apr, pages = {39--49}, title = {Extended Discretionary Access Controls}, year = {1985}, OWNER = {ar-lit}, DATE = {23-08-1994}, COMMENT = {K SEC 13085} } @techreport{Kel90, author= {Kelter, Udo}, title= {Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems}, institution= {Fernuniversit"at Hagen, Arbeitsbereich Praktische Informatik}, year= {1990}, address= {}, month= {}, number= {}, type= {}, owner= {ar-lit}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @incollection {Steinke, author = {Steinke, Gerhard}, title = {Modelling Security Requirements inInformation Systems}, booktitle = {Database Application Engineering with DAIDA, Research Reports ESPRIT, Projekt 892}, year = {}, editor = {Jarke, M.}, volume = {1}, pages = {201-220} } @book{Mat93, author= {Matthes, Florian}, title= {Persistente Objektsysteme}, publisher= {Springer-Verlag}, year= {1993}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: Inhalt: }, } @misc{Fis92, author= {Fischer-H"ubner, Simone}, title= {IDA (Intrusion Detection and Avoidance System): Ein einbruchsentdeckendes und einbruchsvermeidendes System}, howpublished= {Dissertation am Fachbereich Informatik der Universit"at Hamburg}, month= {Juli}, year= {1992}, owner= {tk-lit}, date= {1992}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @techreport{MS93, author= {Matthes, Florian and Schmidt, Joachim W.}, title= {Lean Languages and Models: Towards an Interoperable Kernel for Persistent Object Systems}, institution= {Fachbereich Informatik der Universit"at Hamburg}, year= {1993}, address= {}, month= {}, number= {}, type= {}, owner= {ar-lit}, date= {}, comment= {keywords: Registrierung: status: Inhalt: }, } @misc{Mul92, author= {M{\"u}ller, Kay}, title= {Unterst"utzung von Gruppenkommunikation in offenen verteilten Systemen}, howpublished= {Diplomarbeit am Arbeitsbereich Datenbanken und Informationssyteme der Universit"at Hamburg}, month= {September}, year= {1992}, owner= {tk-lit}, date= {1992}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @incollection {Br93c, author = {Br{\"u}ggemann, Hans H.}, title = {Object-Oriented Authorization}, booktitle = {Advances in Database Systems, Implementations and Applications}, year = {1993}, editor = {Paredaens, J. and Tenenbaum, L.}, volume = {347}, pages = {139-160} } %### USED ### @inproceedings{Br92, author= {Br{\"u}ggemann, Hans H.}, title= {Rights in an Object-Oriented Environment}, booktitle= {Database Security V}, year= {1992}, editor= {Landwehr, C. E. and Jajodia, S.}, volume= {}, number= {}, series= {}, pages= {99-115}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {31051994}, comment= }, } %### USED ### @incollection {BeWe94, author = {Bertino, E. and Weigand, H.}, title = {An approach to authorization modeling in object-oriented database systems}, booktitle = {Data \& Knowledge Engineering}, year = {1994}, editor = {Chen, P. P.}, volume = {12}, pages = {1-29} } ### USED ### @inproceedings{WWL89, author= {Wiseman, Simon and Wood, Andrew and Lewis, Sharon}, title= {The Trouble with Secure Databases}, booktitle= {Proceedings of MILCOMP'89}, year= {1989}, editor= {}, volume= {}, number= {}, series= {}, pages= {164-170}, address= {London}, month= {September}, organization= {}, publisher= {}, owner= {tk-lit}, date= {20101994}, comment= Polyinstanziierung, MAC }, } @techreport{Wis91, author= {Wiseman, Simon}, title= {Lies, Damned Lies And Databases}, institution= {Ministry of Defence, Malvern, Worchestershire, Gro"sbritannien}, year= {1991}, address= {}, month= {}, number= {4503}, type= {Royal Signals \& Radar Establishment Memorandum}, owner= {ar-lit}, date= {}, comment= {keywords: Polyinstanziierung, MAC Registrierung: status: Inhalt: }, } @techreport{Wis89, author= {Wiseman, Simon}, title= {On The Problem of Security in Data Bases}, institution= {Ministry of Defence, Malvern, Worchestershire, Gro"sbritannien}, year= {1989}, address= {}, month= {}, number= {4263}, type= {Royal Signals \& Radar Establishment Memorandum}, owner= {ar-lit}, date= {}, comment= {keywords: Polyinstanziierung, MAC Registrierung: status: Inhalt: }, } @book{Opp92, author= {Oppliger, Rolf}, title= {Computersicherheit}, publisher= {Vieweg-Verlag}, year= {1992}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {08121994}, comment= {keywords: Registrierung: Gdl 363yf (Zentralbib.) status: ### USED ### Inhalt: }, } @book{Sie94, author= {Sienkiewicz, Bodo S.}, title= {Computer-Sicherheit}, publisher= {Addison-Wesley-Verlag}, year= {1994}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {08121994}, comment= {keywords: Registrierung:Gdl 383hf (Zentralbib.) status: ### USED ### Inhalt: }, } @inproceedings{Fis94, author= {Fischer-H"ubner, Simone}, title= {On The Cutting Edge Between Privacy And Security}, booktitle= {Security And Control Of Information Technology In Society}, year= {1994}, editor= {Sizer, Richard and Kaspersen, Henrik and Yngstr"om, Luise and Fischer-H"ubner, Simone}, volume= {}, number= {}, series= {}, pages= {57-70}, address= {}, month= {September}, organization= {IFIP}, publisher= {}, owner= {tk-lit}, date= {02121994}, comment= Polyinstanziierung, MAC K SEC 20765 }, } @book{Tha93, author= {Thaller, Georg Erwin}, title= {Computersicherheit}, publisher= {Vieweg-Verlag}, year= {1993}, editor= {}, volume= {}, number= {18}, series= {DuD Fachbeitr"age}, address= {}, edition= {}, month= {Juni}, owner= {tk-lit}, date= {09031994}, comment= {keywords:computer accidents, definitions Registrierung:Gdl 389 bd (Zentralbuecherei) status: ### USED ### Inhalt: }, } @inproceedings{FLG94, author= {Fern{\'a}ndez, E. B. and Larrondo-Petrie, M. M. and Gudes, E.}, title= {A Method-Based Authorization Model for Object-Oriented Databases}, booktitle= {Security for Object-Oriented Systems}, year= {1994}, editor= {Thuraisingham, B. and Sandhu, R. and Ting, T. C.}, volume= {}, number= {}, series= {}, pages= {135-150}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {08051995}, comment= {keywords:object-oriented, security model Registrierung:K SEC 20584 status: ### USED ### Inhalt: }, } @inproceedings{FGS91, author= {Fern{\'a}ndez, E. B. and Gudes, E. and Song, H.}, title= {Evaluation of Negative, Predicate and Instance-based Authorization}, booktitle= {Database Security IV}, year= {1991}, editor= {Landwehr, C. E. and Jojodia, S.}, volume= {}, number= {}, series= {}, pages= {85-98}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {31051995}, comment= {keywords:object-oriented, security model Registrierung:K DAT 18102 status: ### USED ### Inhalt: }, } @book{RBPEL91, author= {Rumbaugh, J. and Blaha, M. and Premerlani, W. and Eddy, F. and Lorensen, W.}, title= {Object-Oriented Modeling and Design}, publisher= {Prentice Hall International Editions}, year= {1991}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {09051995}, comment= {keywords:OMT Registrierung: bei Gerald status: Inhalt: }, } @techreport{Br93a, author= {Br{\"u}ggemann, Hans H.}, title= {Concepts for Database Privacy}, institution= {Universit"at Hildesheim, Fachbereich Informatik}, year= {1993}, address= {}, month= {}, number= {}, type= {}, owner= {tk-priv}, date= {}, comment= {keywords: Registrierung: priv status: ### USED ### Inhalt: }, } @techreport{Br93b, author= {Br{\"u}ggemann, Hans H.}, title= {Database Security: Policies and Mechanisms}, institution= {Universit"at Hildesheim, Fachbereich Informatik}, year= {1993}, address= {}, month= {}, number= {}, type= {}, owner= {tk-priv}, date= {}, comment= {keywords: Registrierung: priv status: Inhalt: }, } @book{LoSc87, author= {Lockemann, Peter and Schmidt, Joachim W.}, title= {Datenbankhandbuch}, publisher= {Springer-Verlag}, year= {1987}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {24051995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @book{Den82, author= {Denning, Dorothy E.}, title= {Cryptography and Data Security}, publisher= {Addison-Wesley-Verlag}, year= {1982}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {08121994}, comment= {keywords: Registrierung:T Den 7435 status: ### USED ### Inhalt: }, } @techreport{GaMa95, author= {Gawecki, Andreas and Matthes, Florian}, title= {TooL: A Persistent Language Integrating Subtyping, Matching and Type Quantification}, institution= {Universit"at Hamburg, Fachbereich Informatik, Arbeitsbereich DBIS}, year= {1995}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @techreport{DoD87, author= {}, title= {A Guide to Understanding Audit in Trusted Systems}, institution= {Department of Defense, National Computer Security Center}, year= {1987}, key= {DoD87b}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{DHP89, author= {Dittrich, K. R. and H"artig, M. and Pfefferle, H.}, title= {Discretionary Access Control in Structurally Object-Oriented Database Systems}, booktitle= {Database Security II}, year= {1989}, editor= {Landwehr, C. E.}, volume= {}, number= {}, series= {}, pages= {105-122}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {31051995}, comment= K DAT 18100 ### USED ### }, } @misc{Wet94, author= {Wetzel, Ingrid}, title= {Programmieren in STYLE: "Uber die systematische Entwicklung von Programmierumgebungen}, howpublished= {Dissertation am Arbeitsbereich Datenbanken und Informationssysteme der Universit"at Hamburg}, month= {}, year= {1994}, owner= {tk-lit}, date= {1994}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{BeSa94, author= {Bertino, E. and Samarati, P.}, title= {Research Issues in Discretionary Authorizations for Object Bases}, booktitle= {Security for Object-Oriented Systems}, year= {1994}, editor= {Thuraisingham, B. and Sandhu, R. and Ting, T. C.}, volume= {}, number= {}, series= {}, pages= {183-199}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {02061995}, comment= K SEC 20584, ### USED ### }, } @incollection {BoSt94, author = {Born, Eike and Stiegler, Helmut}, title = {Discretionary access control by means of usage conditions}, booktitle = {Computers \& Security}, year = {1994}, editor = {}, volume = {13}, pages = {437-450} } %### USED ### @inproceedings{StLa93, author= {Strack, Hermann and Lam, Kwok-Yan}, title= {Context-Dependent Access Control in Distributed Systems}, booktitle= {Computer Security}, year= {1993}, editor= {Dougall, E. G.}, volume= {}, number= {}, series= {}, pages= {137-155}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {02061995}, comment= ### USED ### }, } @techreport{DoD87a, author= {}, title= {A Guide to Understanding Discretionary Access Control in Trusted Systems}, institution= {Department of Defense, National Computer Security Center}, year= {1987}, key= {DoD87a}, address= {Fort George G. Meade, Maryland}, month= {}, number= {S-228,576}, type= {}, owner= {tk-lit}, date= {28041995}, comment= {keywords: Registrierung: in Security-Verzeichnis status: ### USED ### Inhalt: }, } @techreport{DoD85, author= {}, title= {Trusted Computer Security Evaluation Criteria}, institution= {Department of Defense, National Computer Security Center}, year= {1985}, key= {DoD85}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {12061995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @book{Dit83, author= {Dittrich, Klaus R.}, title= {Ein universelles Konzept zum flexiblen Informationsschutz in und mit Rechensystemen}, publisher= {Springer-Verlag}, year= {1983}, editor= {Brauer, W.}, volume= {}, number= {75}, series= {Informatik-Fachberichte}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {02061995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @book{Boo91, author= {Booch, Grady}, title= {Object Oriented Design With Applications}, publisher= {Benjamin-Cummings Publishing Company Inc.}, year= {1991}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-priv}, date= {12061995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @book{Sen95, author= {Senn, Ann}, title= {Open Systems for Better Business}, publisher= {International Thomson Publishing Inc.}, year= {1995}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-priv}, date= {12061995}, comment= {keywords: Registrierung: status: Inhalt: }, } @book{Tsa95, author= {Tsai, Thomas C.}, title= {A Network of Objects}, publisher= {International Thomson Publishing Inc.}, year= {1995}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-priv}, date= {12061995}, comment= {keywords: Registrierung: status: Inhalt: }, } @book{Vas89, author= {Vas..., Joseph A.}, title= {Understanding Database Management Systems}, publisher= {Wadsworth Publishing Company Inc.}, year= {1989}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-priv}, date= {12061995}, comment= {keywords: Registrierung: status: Inhalt: }, } @inproceedings{FeKu93, author= {Ferraiolo, David and Kuhn, Richard}, title= {Role-Based Access Controls}, booktitle= {Information Systems Security: Building Blocks to the Future}, year= {1993}, editor= {}, volume= {II}, number= {}, series= {15th Computer Security Conference}, pages= {137-155}, address= {}, month= {}, organization= {National Institute of Standards and Technology}, publisher= {}, owner= {tk-lit}, date= {02061995}, comment= ### USED ###}, } @inproceedings{Lun91, author = {Lunt, T. F.}, booktitle = {Sicherheit in Informationssystemen - Proceedings der 2. Deutschen Konferenz {\"u}ber Computersicherheit}, editor = {Lippold, H. and Schmitz, P. and Kersten, H.}, publisher = {Vieweg-Verlag}, title = {Security in Database Systems: A Researcher's View}, year = {1991}, OWNER = {ar-lit}, DATE = {before december 1993}, COMMENT = {keywords: multi level security Registrierung: K COM 16837 status: Inhalt: guter ueberblick ueber multi level secure db ### USED ###} } @techreport{MiCe84, author= {Millen, J. K. and Cerniglia, C. M.}, title= {Computer Security Models}, institution= {The MITRE Corporation}, year= {1984}, address= {Bedford, Massachusetts}, month= {September}, number= {}, type= {}, owner= {tk-lit}, date= {}, comment= {keywords: Registrierung: R 15928 status: ### USED ### Inhalt: }, } @book{Poh89, author= {Pohl, Hartmut}, title= {Sicherheit der Informationstechnik}, publisher= {Datakontext Verlag}, year= {1989}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-priv}, date= {12061995}, comment= {keywords: Registrierung: status: Inhalt: }, } @misc{Mei93, author= {Meier, Jens}, title= {Grundlagen sicherer IT-Systeme und deren Umsetzung in Anwendungen mir relationalen Datenbanksystemen}, howpublished= {Diplomarbeit am Fachbereich Informatik der Universit"at Hamburg}, month= {Mai}, year= {1993}, owner= {tk-lit}, date= {1993}, comment= {keywords: Registrierung: R 26066 (D-Archiv) status: ### USED ### Inhalt: }, } @book{BuGa95, author= {Buck-Emden, R{\"u}diger and Galimow, J{\"u}rgen}, title= {Die Client/Server-Technologie des Systems R/3}, publisher= {Addison Wesley Verlag}, year= {1995}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {12061995}, comment= {keywords: Registrierung: Kopien bei Rainer status: ### USED ### Inhalt: }, } @book{Hof90, author= {Hoffman, Lance J.}, title= {Rogue Programs: Viruses, Worms and Trojan Horses}, publisher= {Van Nostrand Reinhold Verlag}, year= {1990}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-priv}, date= {13061995}, comment= {keywords: Registrierung: z. Zt. bei Rudloff status: ### USED ### Inhalt: }, } @techreport{Ste91, author= {Steinke, Gerhard}, title= {Design Aspects of Access Control in a Knowledge Base System}, institution= {Universit"at Passau, Fakult"at f"ur Mathematik und Informatik}, year= {1991}, address= {}, month= {}, number= {}, type= {}, owner= {ar-lit}, date= {130695}, comment= {keywords: Registrierung: status: Inhalt: }, } @inproceedings{MaSc93, author= {Matthes, Florian and Schmidt, Joachim W.}, title= {System Construction in the Tycoon Environment: Architectures, Interfaces and Gateways}, booktitle= {Proceedings of the Euro-ARCH '93}, year= {1993}, editor= {}, volume= {}, number= {}, series= {}, pages= {301-317}, address= {}, month= {}, organization= {}, publisher= {Springer Verlag}, owner= {tk-lit}, date= {13061995}, comment= }, } @inproceedings{JKP93, author= {Jurecic, M. and Kohl, U. and Pelikan, E.}, title= {Datenschutz und Datensicherheit f"ur verteilte Klinikanwendungen}, booktitle= {Entwicklung und Management verteilter Anwendungssysteme}, year= {1993}, editor= {}, volume= {}, number= {}, series= {}, pages= {}, address= {}, month= {}, organization= {GI/ITG Fachgruppe Kommunikation und Verteilte Systeme}, publisher= {Universit{\"a}t Frankfurt}, owner= {tk-lit}, date= {14061995}, comment= {keywords: Registrierung:DBis-Bib status: ### USED ### Inhalt: }, } @techreport{MMS94, author= {Matthes, Florian and M{\"u}{\ss}ig, Sven and Schmidt, Joachim W.}, title= {Persistent Polymorphic Programming in Tycoon: An Introduction}, institution= {Fachbereich Informatik der Universit"at Hamburg}, year= {1994}, address= {}, month= {August}, number= {FIDE/94/106}, type= {}, owner= {ar-lit}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @techreport{MMM93, author= {Mathiske, Bernd and Matthes, Florian and M{\"u}{\"s}ig, Sven}, title= {The Tycoon System and Library Manual}, institution= {Fachbereich Informatik der Universit"at Hamburg}, year= {1993}, address= {}, month= {Dezember}, number= {DBIS Tycoon Report 212-93}, type= {}, owner= {ar-lit}, date= {}, comment= {keywords: Registrierung: status: Inhalt: }, } @inproceedings{Abr93, author= {Abrams, Marshall D.}, title= {Renewed Understanding of Access Control Policies}, booktitle= {Proceedings of the 16th National Computer Security Conference - Information System Security: User Choices}, year= {1993}, editor= {}, volume= {}, number= {}, series= {}, pages= {87-96}, address= {}, month= {}, organization= {National Institute of Standards and Technology}, publisher= {}, owner= {tk-lit}, date= {14061995}, comment= ### Used ### }, } @book{For94, author= {Forcht, Karen A.}, title= {Computer Security Management}, publisher= {Boyd \& Fraser Verlag}, year= {1994}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {15061995}, comment= {keywords: Registrierung: G For 20718 status: ### USED ### Inhalt: }, } @book{Wir86, author= {Wirth, Niklaus}, title= {Algorithmen und Datenstrukturen mit Modula-2}, publisher= {Teubner Verlag}, year= {1986}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {15061995}, comment= {keywords: Registrierung:P Wir ... status: ### USED ### Inhalt: }, } @book{OtWi93, author= {Ottmann, T. and Widmayer, P.}, title= {Algorithmen und Datenstrukturen}, publisher= {BI Wissenschaftsverlag}, year= {1993}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {15061995}, comment= {keywords: Registrierung:P Ott 19571, bei Rainer status: ### USED ### Inhalt: }, } @techreport{Fai94, author= {Fairthorne, Belinda}, title= {OMG White Paper on Security}, institution= {Object Management Group, Security Working Group}, year= {1994}, address= {}, month= {April}, number= {}, type= {}, owner= {tk-lit}, date= {}, comment= {keywords: Registrierung: im Ordner status: ### USED ### Inhalt: }, } @inproceedings{Kel91, author= {Kelter, Udo}, title= {Discretionary Access Controls in a High-Performance Object Management System}, booktitle= {Proceedings 1991 IEEE Symposium on Security and Privacy}, year= {1991}, editor= {}, volume= {}, number= {}, series= {}, pages= {}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {15061995}, comment= ### Used ### }, } @inproceedings{Lew91, author= {Lewis, S. R.}, title= {The Front End Approach to Database Security}, booktitle= {Proceedings of the 7th International IFIP TC11 Conference on Information Security}, year= {1991}, editor= {}, volume= {}, number= {}, series= {}, pages= {}, address= {}, month= {Mai}, organization= {}, publisher= {}, owner= {tk-lit}, date= {15061995}, comment= }, } @inproceedings{GrWa76, author= {Griffith, P. P. and Wade, B. W.}, title= {An Authorization Mechanism for a Relationale Database System}, booktitle= {ACM Transactions on Database Systems}, year= {1976}, editor= {}, volume= {1(3)}, number= {}, series= {}, pages= {242-255}, address= {}, month= {September}, organization= {}, publisher= {}, owner= {tk-lit}, date= {19061994}, comment= }, } %### USED ### @inproceedings{HRU76, author= {Harrison, M. A. and Ruzzo, W. L. and Ullman, J. D.}, title= {Protection in Operating Systems}, booktitle= {Communications of the ACM}, year= {1976}, editor= {}, volume= {19(8)}, number= {}, series= {}, pages= {461-471}, address= {}, month= {August}, organization= {}, publisher= {}, owner= {tk-lit}, date= {19061994}, comment= Unentscheidbarkeit sicherer Systeme }, } %### USED ### @inproceedings{Har81, author= {Hartson, H. Rex}, title= {Database Security-System Architectures}, booktitle= {Information Systems}, year= {1981}, editor= {}, volume= {6}, number= {}, series= {}, pages= {1-22}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {19061994}, comment= Unentscheidbarkeit sicherer Systeme }, } %### USED ### @book{Gas88, author= {Gasser, Morrie}, title= {Building a Secure Computer System}, publisher= {Van Nostrand Reinhold Verlag}, year= {1988}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {19061995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{Wis90, author= {Wiseman, Simon}, title= {The Control of Integrity in Databases}, booktitle= {Proceedings of IFIP WG11.3, Database Security Workshop}, year= {1990}, editor= {}, volume= {}, number= {}, series= {}, pages= {}, address= {Halifax, Yorkshire, England}, month= {September}, organization= {}, publisher= {}, owner= {tk-lit}, date= {22061995}, comment= Polyinstanziierung, MAC }, } @techreport{Woo90, author= {Wood, A.W.}, title= {The SWORD Model of Multilevel Secure Databases}, institution= {Ministry of Defence, Procurement Executive}, year= {1990}, address= {Malvern, Yorkshire}, month= {June}, number= {90008}, type= {Royal Signals \& Radar Establishment Memorandum}, owner= {tk-lit}, date= {}, comment= {keywords: Registrierung: im Ordner status: ### USED ### Inhalt: }, } @techreport{CK94, author = {Cooper, Richard and Kirby, G. N. C.}, institution = fidecoord, number = {FIDE/94/108}, title = {Type-Safe Linguistic Run-time Reflection: A Practical Perspective}, type = fiderep, year = {1994}, keywords = {reflection, Napier} } @inproceedings{MMWY92, author= {Masuhara, Hidehiko and Matsuoka, Satoshi and Watanabe, Takuo and Yonezawa Akinori}, title= {Object-Oriented Concurrent Reflective Languages can be Implemented Efficiently}, booktitle= {Proceedings of the 1992 Conference on Object-Oriented Programming Systems, Languages and Applications}, year= {1992}, editor= {}, volume= {}, number= {}, series= {}, pages= {127-144}, address= {}, month= {Oktober}, organization= {OOPSLA}, publisher= {}, owner= {tk-lit}, date= {26061995}, comment= }, } @book{Smi89, author= {Smith, Jeffrey, D.}, title= {Design and Analysis of Algorithms}, publisher= {PWS-Kent Publishing Company}, year= {1989}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {27061995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{Den87, author= {Denning, D. E. and Lunt, T. F. and Schell, R. R. and Shockley, W. R. and Heckman, W. R.}, title= {A Multilevel Relational Data Model}, booktitle= {Proceedings of the IEEE Symposium on Security and Privacy}, year= {1987}, editor= {}, volume= {}, number= {}, series= {}, pages= {220-234}, address= {}, month= {April}, organization= {}, publisher= {}, owner= {tk-lit}, date= {29061995}, comment= }, } @techreport{Bib77, author= {Biba, K. J.}, title= {Integrity Considerations for Secure Computer Systems}, institution= {MITRE Corporation}, year= {1977}, address= {Bedford}, month= {Juni}, number= {MTR-3153}, type= {}, owner= {tk-lit}, date= {}, comment= {keywords: Registrierung: im Ordner status: ### USED ### Inhalt: }, } @techreport{BeLa76, author = {Bell, D. E. and LaPadula, L. J.}, address = {Bedford, Massachusetts}, institution = {The MITRE Corporation}, number = {ESD-TR-75-306}, title = {Secure Computer Systems: Unified Exposition and Multics Interpretation}, year = {1976}, OWNER = {tk-lit}, DATE = {30061995}, COMMENT = {keywords: multi level security, bell lapadula Registrierung: status: Inhalt: grundlegendes modell fuer multi level security} } @techreport{MS92, author= {Matthes, Florian and Schmidt, Joachim W.}, title= {The database programming language DBPL: Rationale and report}, institution= {Fachbereich Informatik der Universit"at Hamburg}, year= {1992}, address= {}, month= {Juli}, number= {FIDE/92/46}, type= {}, owner= {tk-lit}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @incollection {MRS84, author = {Mall, Manuel, Reimer, Manuel and Schmidt, Joachim W.}, title = {Data Selection, Sharing and Access Control in a Relational Scenario}, booktitle = {On Conceptual Modelling}, year = {1984}, editor = {Brodie, Michael L. and Mylopoulos, John and Schmidt, Joachim W.}, volume = {}, pages = {411-440} } @inproceedings{MS94, author= {Matthes, Florian and Schmidt, Joachim W.}, title= {The DBPL Project: Advances in Modular Database Programming}, booktitle= {Information Systems}, year= {1994}, editor= {}, volume= {19}, number= {2}, series= {}, pages= {121-140}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {05071995}, comment= }, } %### USED ### @techreport{MMS95, author= {Mathiske, Bernd and Matthes, Florian and Schmidt, Joachim W.}, title= {Scaling Database Languages to Higher-Order Distributed Programming}, institution= {Universit"at Hamburg, Fachbereich Informatik}, year= {1995}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {06071995}, comment= {keywords: Registrierung: status: Inhalt: }, } @techreport{MaMS95, author= {Mathiske, Bernd and Matthes, Florian and Schmidt, Joachim W.}, title= {On Migrating Threads}, institution= {Universit"at Hamburg, Fachbereich Informatik}, year= {1995}, address= {}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {07101994}, comment= {keywords: Registrierung: status: Inhalt: }, } @inproceedings{MaS94, author= {Matthes, Florian and Schmidt, Joachim W.}, title= {Persistent Threads}, booktitle= {Proceedings of the Twentieth International Conference on Very Large Data Bases}, year= {1994}, editor= {}, volume= {}, number= {}, series= {}, pages= {403-414}, address= {Santiago de Chile}, month= {September}, organization= {}, publisher= {}, owner= {tk-lit}, date= {06071995}, comment= }, } %### USED ### @book{Cor91, author= {Corbin, J. R.}, title= {The Art of Distributed Applications}, publisher= {Springer Verlag}, year= {1991}, editor= {}, volume= {}, number= {}, series= {Sun Technical Reference Library}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {06071995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @book{OSF93, author= {OSF}, title= {OSF DCE Administration Guide - Core Components}, publisher= {Prentice Hall Verlag}, year= {1993}, editor= {}, volume= {}, number= {}, series= {}, address= {Englewood Cliffs, NewJersey}, edition= {}, month= {}, owner= {tk-lit}, date= {06071995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @techreport{Car94, author= {Cardelli, Luca}, title= {Obliq: A language with distributed scope}, institution= {Digital Equipment Corporation, Systems Research Center}, year= {1994}, address= {Palo Alto, Kalifornien}, month= {Juni}, number= {}, type= {}, owner= {tk-lit}, date= {06071995}, comment= {keywords: Registrierung: status: Inhalt: }, } @book{Hof77, author= {Hoffman, Lance J.}, title= {Modern Methods for Computer Security and Privacy}, publisher= {Prentice-Hall}, year= {1977}, editor= {}, volume= {}, number= {}, series= {}, address= {Englewood Cliffs, New Jersey}, edition= {}, month= {}, owner= {tk-priv}, date= {10071995}, comment= {keywords: Registrierung: status: Inhalt: }, } @book{Heu92, author= {Heuer, Andreas}, title= {Objektorientierte Datenbanken}, publisher= {Addison-Wesley Verlag}, year= {1992}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-priv}, date= {11071995}, comment= {keywords: Registrierung: status: Inhalt: }, } @manual {FrWe95, title = {\davinci \hspace*{0.5mm}V1.4 User Manual}, author = {Fr{\"o}hlich, Michael and Werner, Matthias}, organization = {Universit"at Bremen}, address = {}, edtion = {}, month = {Juni}, year = {1995}, note = {}, owner = {tk-lit}, reg-date = {210795}, abstract = {}, keywords = {}, directory = {}, key = {}, comment = {} } @techreport{FrWe94, author= {Fr{\"o}hlich, Michael and Werner, Matthias}, title= {The Graph Visualization System \davinci - A User Interface for Applications}, institution= {Universit{\"a}t Bremen, Fachbereich Informatik}, year= {1994}, address= {}, month= {September}, number= {5/94}, type= {}, owner= {tk-lit}, date= {24071995}, comment= {keywords: Registrierung: status: Inhalt: }, } @inproceedings{Bir94, author= {Bird, Barry}, title= {The Security Facilities of PCTE}, booktitle= {Security for Object-Oriented Systems}, year= {1994}, editor= {Thuraisingham, B. and Sandhu, R. and Ting, T. C.}, volume= {}, number= {}, series= {}, pages= {25-42}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {26071995}, comment= {keywords:object-oriented, security model Registrierung:K SEC 20584 status: ### USED ### Inhalt: }, } @incollection {Mor91, author = {Morgenstern, Matthew}, title = {A Security Model for Multilevel Objects with Bidirectional Relationships}, booktitle = {Database Security}, year = {1991}, editor = {Landwehr, C. E. and Jajodia, S.}, volume = {IV}, pages = {53-72} } @incollection {Thu91, author = {Thuraisingham, Bhavani}, title = {Multilevel Security for Multilevel Database Systems}, booktitle = {Database Security}, year = {1991}, editor = {Landwehr, C. E. and Jajodia, S.}, volume = {IV}, pages = {99-116} } @incollection {BCGY94, author = {Boulahia-Cuppens, N. and Cuppens, F. and Gabillon, A. and Yazdanian, K.}, title = {Multilevel Security in Object-Oriented Databases}, booktitle = {Security for Object-Oriented Systems}, year = {1994}, editor = {Thuraisingham, B. and Sandhu, R. and Ting, T. C.}, volume = {}, pages = {79-89} } @incollection {BJS94, author = {Bertino, E. and Jajodia, S. and Samarati, P.}, title = {Enforcing Mandatory Access Control in Object Bases}, booktitle = {Security for Object-Oriented Systems}, year = {1994}, editor = {Thuraisingham, B. and Sandhu, R. and Ting, T. C.}, volume = {}, pages = {96-116} } @inproceedings{FKK90, author= {Freisleben, B. and Kammerer, P. and Keedy, J. L.}, title= {Capabilities and Encryption: The Ultimate Defense Against Security Attacks?}, booktitle= {Security and Persistence}, year= {1990}, editor= {Rosenberg, J. and Keedy, J. L.}, volume= {}, number= {}, series= {}, pages= {}, address= {Bremen}, month= {}, organization= {}, publisher= {Springer Verlag}, owner= {tk-lit}, date= {08051995}, comment= {keywords:object-oriented, security model Registrierung:K Com 17297 bei Rudloff status: ### USED ### Inhalt: }, } @inproceedings{BrNa89, author = {Brewer, D. F. C. and Nash, J. W.}, address = {Oakland, California}, booktitle = IEEESec89, publisher = {IEEE Computer Society Press}, title = {The Chinese Wall Security Policy}, year = {1989}, OWNER = {ar-lit}, DATE = {before december 1993}, COMMENT = {keywords: chinese wall Registrierung: K SEC 14278 status: Inhalt: chinese wall modell - zugriffsberechtigung richtet sich nach den bereits zugegriffenen objekten - modell stammt aus der unternehmensberatung (konkurrenzsituation)} } @techreport{Fis95, author= {Fischer-H{\"u}bner, Simone}, title= {Considering Privacy as a Security-Aspect: A Formal Privacy-Model}, institution= {Institut for Anvendt Datalogi og Systemvidenskab, Handelsh{\o}jskolen i K{\o}benhavn}, year= {1995}, address= {Frederiksberg, D{\"a}nemark}, month= {}, number= {5/95}, type= {DASY Papers}, owner= {tk-lit}, date= {27071995}, comment= {keywords: Registrierung: status: Inhalt: }, } @inproceedings{CMN90, author= {Jensen McCollum, C. and Messing, J. R. and Notargiacomo, L.}, title= {Beyond the Pale of MAC and DAC - Defining New Forms of Access Control}, booktitle= {Proceedings 1990 IEEE Symposium on Security and Privacy}, year= {1990}, editor= {}, volume= {}, number= {}, series= {}, pages= {190-200}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {03081995}, comment= ### Used ### }, } @misc{EDBT93, author= {Bertino, Elisa}, title= {Architectural Issuses in OODBMS}, howpublished= {Seminarunterlagen zur EDBT Summer School in Leysin (Schweiz)}, month= {September}, year= {1993}, owner= {tk-lit}, date= {1993}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @misc{Mue94, author= {M{\"u}nnix, Petra}, title= {Objektorientierte Datenmodellierung: Generierung statisch typisierter Repr{\"a}sentationen}, howpublished= {Diplomarbeit am Arbeitsbereich Datenbanken und Informationssysteme der Universit"at Hamburg}, month= {Juli}, year= {1994}, owner= {tk-lit}, date= {1994}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{HK87, author= {Hull, R. and King, R.}, title= {Semantic Database Modelling: Survey Applications and Research Issues}, booktitle= {ACM: Computing Surveys}, year= {1987}, editor= {}, volume= {19(3)}, number= {}, series= {}, pages= {}, address= {}, month= {}, organization= {}, publisher= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @article{ACO85, key= {ACO85}, author= {Albano, A. and Cardelli, L. and Orsini, R.}, title= {Galileo: A Strongly-Typed, Interactive Conceptual Language}, journal= {ACM Transactions on Database Systems}, volume= 10, number= 2, year= {1985}, pages= {230--260} } @article{ACC81, key= {ACC81}, author= {Atkinson, M. P. and Chisholm, K. J. and Cockshott, W. P.}, title= {PS-Algol: An Algol with a Persistent Heap}, journal= {ACM SIGPLAN notices}, volume= 17, number= 7, year= {1981}, keywords= {} } @book{Nels91, key= {Nels91}, editor= {Nelson, G.}, title= {Systems programming with Modula-3}, publisher= {Prentice Hall}, series= {Series in innovative technology}, year= {1991}, keywords= {(Revised) Modula-3 Report, Standard Interfaces, Floating Point, Pickles, Concurrent Programming with Threads, Thread Synchroinzation [Spec a la Larch], I/O Sterams: Abstract Types, Real Programs, Trestle Window System Tutorial, Discussion=Language Rationale} } @inproceedings{DCBM89, key= {DCBM89}, author= {Dearle, A. and Connor, R. and Brown, F. and Morrison, R.}, title= {{Napier88} -- A Database Programming Language?}, booktitle= {Proceedings of the Second International Workshop on Database Programming Languages}, month= {Juni}, year= {1989}, address= {Portland, Oregon}, keywords= {Napier type system description, polymorphism} } @book{Meye88, key= {Meye88}, author= {Meyer, B.}, title= {Object-oriented Software Construction}, publisher= {Prentice Hall}, series= {International Series in Computer Science}, year= {1988}, keywords= {Eiffel, description of OO PL concepts} } @inproceedings{Miln84, key= {Miln84}, author= {Milner, R.}, title= {A proposal for {Standard ML}}, booktitle= {Proceedings of the ACM symposium on Lisp and Functional Programming}, year= {1984}, comments= {see also \cite{MTH90}} } @book{MTH90, key= {MTH90}, author= {Milner, R. and Tofte, M. and Harper, R.}, title= {The Definition of {Standard ML}}, publisher= {MIT-Press}, year= {1990}, address= {Cambridge, Massachusetts}, keywords= {formal language report Standard ML}, comments= {Signatur P MIL #15645 54954} } @inproceedings{Turn85, key= {Turn85}, author= {Turner, D. A.}, title= {Miranda: A non-strict functional language with polymorphic types}, editor= {Jouannaud, J. P.}, booktitle= {Functional Programming Languages and Computer Architecture}, series= {Lecture Notes in Computer Science}, volume= 201, year= {1985}, pages= {1--16}, keywords= {Miranda is based on SASL, KRC, successors are Haskell and Orwell} } @incollection{CMMS91, key= {CMMS91}, author= {Cardelli, L. and Martini, S. and Mitchell, J. C. and Scedrov, A.}, title= {An Extension of System {F} with Subtyping}, pages= {750--770}, editor= {Ito, T. and Meyer, A.R.}, booktitle= {Theoretical Aspects of Computer Software, TACS 91}, series= {Lecture Notes in Computer Science}, publisher= {Springer-Verlag}, year= {1991}, keywords= {System F, types, Fsub, encoding booleans, natural numbers} } @misc{DES77, howpublished = {Federal Information Processing Standards, no. 46, National Bureau of Standards, U.S. Department of Commerce}, key = {DES77}, title = {Data Encryption Standard}, year = {1977}, OWNER = {ar-lit}, DATE = {23-08-1994}, COMMENT = {DES Standard} } @article{RSA78, author = {Rivest, R. and Shamir, A. and Adleman, L.}, journal = {Communications of the ACM}, key = {RSA78}, number = {2}, title = {A Method for Obtaining Digital Signatures and Public Key Cryptosystems}, volume = {21}, year = {1978}, OWNER = {ar-lit}, DATE = {23-08-1994}, COMMENT = {original referenz fuer RSA, auch in "Secure Communications and Asymetric Cryptosystems, Ed. Simmons, G.J., K AAA 7823"} } @misc{Boe95, author= {B{\"o}sch, Andreas}, title= {PolitIcon: Entwurf einer Bilddatenbank f{\"u}r den Index zur politischen Ikonographie}, howpublished= {Studienarbeit am Arbeitsbereich Datenbanken und Informationssysteme der Universit"at Hamburg}, month= {September}, year= {1995}, owner= {tk-lit}, date= {1995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @misc{KoNe93, author = {Kohl, J. and Neuman, B. C.}, howpublished = {working draft - currently released as Internet Draft}, month = {April}, title = {The Kerberos Network Authentication Service (V5)}, year = {1993}, OWNER = {ar-lit}, DATE = {before december 1993}, COMMENT = {keywords: Registrierung: status: Inhalt:} } @inproceedings{SNS88, author = {Steiner, J. G. and Neumann, B. C. and Schiller, J. I.}, booktitle = {Proceedings of the Winter 1988 Usenix Conference}, key = {SNS88}, month = {Februar}, title = {Kerberos: An authentication service for open network systems}, year = {1988}, OWNER = {ar-lit}, DATE = {before december 1993}, COMMENT = {keywords: Registrierung: R 23898 status: Inhalt: basisreferenz fuer kerberos} } @book{Garf95, author= {Garfinkel, Simson}, title= {PGP: Pretty Good Privacy}, publisher= {O'Reilly \& Associates}, year= {1995}, comment= {keywords: pgp, authentisierung, krypthographie Registrierung: Oliver Schmelzle status: Inhalt: alles ueber PGP, ganz nett, aber nichts wesentlich neues }, } @misc{Kir94, author= {Kiradjiev, Plamen}, title= {Dynamische Optimierung in CPS-orientierten Zwischensprachen}, howpublished= {Diplomarbeit am Arbeitsbereich Datenbanken und Informationssysteme der Universit"at Hamburg}, month= {November}, year= {1994}, owner= {tk-lit}, date= {1994}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @techreport{GaMa94, author= {Gawecki, Andreas and Matthes, Florian}, title= {The Tycoon Machine Language TML: An Optimizable Persistent Program Representation}, institution= {Fachbereich Informatik der Universit"at Hamburg}, year= {1994}, address= {}, month= {August}, number= {FIDE/94/100}, type= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords: Registrierung: status: Inhalt: }, } @techreport{Plo81, author= {Plotkin, G.~D.}, title= {A Structural Appraoch to Operational Semantics}, institution= {Universit"at Aarhus, D"anemark}, year= {1981}, abstract= {standard reference for operational semantics; deduction rules }} @techreport{CaLo90, key= {CaLo90}, author= {Cardelli, L. and Longo, G.}, title= {A semantic basis for Quest}, institution= {Digital Equipment Corporation, Systems Research Center, Palo Alto, Kalifornien}, number= 55, month= {M{\"a}rz}, year= {1990}, keywords= {Quest, impredicativity, coercion, subsumption, kinds, operators, partial equivalence model, PER}, comments= {Many errata fixed in later publication CaLo91} } @techreport{Card89, key= {Card89}, author= {Cardelli, Luca}, title= {Typeful Programming}, institution= {Digital Equipment Corporation, Systems Research Center, Palo Alto, Kalifornien}, number= 45, month= {Mai}, year= {1989}, keywords= {Quest language report, second-order type system} } @misc{Gei95, author= {Geisler, Andreas}, title= {Basisdienste zur Gestaltung einer reflektiven grafischen Entwicklungsumgebung f"ur eine persistente Programmiersprache.}, howpublished= {Diplomarbeit am Arbeitsbereich Datenbanken und Informationssysteme der Universit"at Hamburg}, month= {Juni}, year= {1995}, owner= {tk-lit}, date= {1995}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @book{Sta95, author= {Stallings, William}, title= {Sicherheit im Datennetz}, publisher= {Prentice Hall-Verlag}, year= {1995}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords:authentisierung, kryptographie Registrierung:D Sta 21781 status: Inhalt: }, } @inproceedings{DNP87, author= {Denning, D. E. and Neumann, P. G. and Parker, D. B.}, title= {Social Aspects of Computer Security}, booktitle= {10th National Computer Security Conference}, year= {1987}, editor= {}, volume= {}, number= {}, series= {}, pages= {320-325}, address= {Baltimore, USA}, month= {}, organization= {}, publisher= {}, owner= {}, date= {}, comment= {keywords: Registrierung: R 20872 status: ### USED ### Inhalt: }, } @book{Wir85, author= {Wirth, Niklaus}, title= {Programmieren in Modula-2}, publisher= {Springer-Verlag}, year= {1985}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {15061995}, comment= {keywords: Registrierung:P Wir ... status: ### USED ### Inhalt: }, } @inproceedings{CW85, author= {Cardelli, L. and Wegner, P.}, title= {On Understanding Types, Data Abstraction and Polymorphism}, booktitle= {ACM: Computing Surveys}, year= {1985}, editor= {}, volume= {17(4)}, number= {}, series= {}, pages= {477-522}, address= {}, month= {Dezember}, organization= {}, publisher= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{Dit94, author= {Dittrich, Klaus R.}, title= {Current Trends in Database Technology and Their Impact on Security Concepts}, booktitle= {Proceedings of the IFIP WG 11.3 Eighth Annual Working Conference on Database Security}, year= {1994}, editor= {Biskup, J. and Morgenstern, M. and Landwehr, C.}, volume= {}, number= {}, series= {}, pages= {}, address= {Universit{\"a}t Hildesheim, Institut f{\"u}r Informatik}, month= {August}, organization= {}, publisher= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @book{CFMS95, author= {Castano, Silvana and Fugni, Maria G. and Martella, Giancarlo and Samarati, Pierangela}, title= {Database Security}, publisher= {Addison Wesley Verlag}, year= {1995}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {22111995}, comment= {keywords: Registrierung:P Dat 21913 status: Inhalt: }, } @incollection{PP92, author= {Pfitzmann, A. and Pfitzmann, B.}, title= {Technical Aspects of Data Protection in Health Care Informatics}, pages= {368-386}, editor= {Noothoven van Goor, J. and Christensen, J. P.}, booktitle= {Advances in Medical Informatics}, series= {}, publisher= {IOS Press}, year= {1992}, keywords= {} } @techreport{Hos92, author= {Hosmer, Hilary H.}, title= {The Multipolicy Paradigm}, institution= {Data Security Inc.}, year= {1992}, address= {58 Wilson Road, Bedford, MA 01730}, month= {}, number= {}, type= {}, owner= {tk-lit}, date= {28111995}, comment= {keywords: Kommerzielle Systeme sind unflexibel, die eingebaute Sicherheitspolitik kann nicht bedarfsgerecht angepasst werden. Registrierung: status: Inhalt: }, } @incollection{Ble94, author= {Bleumer, Gerrit}, title= {Security for Decentralized Health Information Systems}, pages= {139-146}, editor= {Barber, B. and Bakker, A. R. and Bengtsson, S.}, booktitle= {Caring for Health Information - Safety, Security, Secrecy}, series= {}, publisher= {Elsevier Science}, year= {1994}, keywords= {} } @book{Pri90, author= {Prinz, Wolfgang}, title= {Application of the X.500 Directory by Office Systems: Support for Representation, Authentication, Authorization and MHS}, publisher= {Gesellschall f{\"u}r Mathematik und Datenverarbeitung mbH}, year= {1990}, editor= {}, volume= {}, number= {181}, series= {GMD-Berichte}, address= {}, edition= {}, month= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: Inhalt: }, } @inproceedings{Bry94, author= {Bryce, Ciar{\'a}n}, title= {An Access Control Model for a Parallel Object-Based Programming Language}, booktitle= {Security for Object-Oriented Systems}, year= {1994}, editor= {Thuraisingham, B. and Sandhu, R. and Ting, T. C.}, volume= {}, number= {}, series= {}, pages= {166-182}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {08051995}, comment= {keywords:object-oriented, security model Registrierung:K SEC 20584 status: ### USED ### Inhalt: }, } @inproceedings{Tal94, author= {Talvitie, James A.}, title= {An Object-Oriented Application Security Framework}, booktitle= {Security for Object-Oriented Systems}, year= {1994}, editor= {Thuraisingham, B. and Sandhu, R. and Ting, T. C.}, volume= {}, number= {}, series= {}, pages= {55-75}, address= {}, month= {}, organization= {}, publisher= {}, owner= {tk-lit}, date= {08051995}, comment= {keywords:object-oriented, security model Registrierung:K SEC 20584 status: ### USED ### Inhalt: }, } @inproceedings{Sch77, author= {Schmidt, Joachim W.}, title= {Some High Level Language Constructs for Data of Type Relation}, booktitle= {Proceedings of the ACM-SIGMOD International Conference on Management of Data}, year= {1977}, editor= {}, volume= {}, number= {}, series= {}, pages= {}, address= {Toronto, Kanada}, month= {August}, organization= {}, publisher= {}, owner= {tk-lit}, date= {20101994}, comment= {keywords: Registrierung: status: Inhalt: }, } @book{Pfl89, author= {Pfleeger, Charles P.}, title= {Security in Computing}, publisher= {Prentice Hall-Verlag}, year= {1989}, editor= {}, volume= {}, number= {}, series= {}, address= {}, edition= {}, month= {}, owner= {tk-lit}, date= {15061995}, comment= {keywords: Registrierung: bei Mone status: ### USED ### Inhalt: }, } @article{LiHe94, author= {Lindgreen, E. E. O. R. and Herschberg, I. S.}, title= {On the validity of the Bell-LaPadula model}, journal= {Computers \& Security}, year= {1994}, volume= {13}, number= {4}, pages= {317--333}, owner= {ar-lit}, date= {8-12-1994}, comment= {keywords: Registrierung: bib status: Inhalt: ERkenntnis: BLP ist nicht das Supermodel fuer alles (war auch so klar), Hautpzweck von MAC ist nicht ein sezielles model, sondern auch die Kontrolle der Weitergabe von Objekten (z.B. durch Kopieren) }, } @techreport{RWBM90, author= {Roskos, J. E. and Welke, S. and Boone, J. and Mayfield, T.}, title= {Integrity in the Department of Defense Computer Systems}, institution= {Institute for Defense Analysis}, year= {1990}, key= {}, address= {Virginia}, month= {Juli}, number= {Draft IDA Paper P-2316}, type= {}, owner= {tk-lit}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{FHB89, author= {Fischer-H{\"u}bner, S. and Brunnstein, K.}, title= {Opportunities and Risks of Intrusion Detection Expert Systems}, booktitle= {Proceedings of the International IFIP-GI-Conference on Opportunities and Risks of Artificial Intelligence Systems, ORAIS '89}, year= {1989}, editor= {Brunnstein, K. and Fischer-H{\"u}bner, S. and Engelbrecht, R.}, volume= {}, number= {}, series= {}, pages= {317-323}, address= {Universit{\"a}t Hamburg}, month= {Juli}, organization= {}, publisher= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{FHB90, author= {Fischer-H{\"u}bner, S. and Brunnstein, K.}, title= {Combining Verified and Adaptive System Components Towards More Secure Computer Architectures}, booktitle= {Security and Persistence}, year= {1990}, editor= {Rosenberg, J. and Keedy, J. L.}, volume= {}, number= {}, series= {Workshops in Computing}, pages= {301-308}, address= {Bremen}, month= {Mai}, organization= {}, publisher= {Springer-Verlag}, owner= {tk-lit}, date= {08051995}, comment= {keywords:object-oriented, security model Registrierung:K SEC 20584 status: ### USED ### Inhalt: }, } @inproceedings{Lip91, author= {Lipner, S. B.}, title= {Criteria, evaluation and the international environment}, booktitle= {IFIP Information Security}, year= {1991}, editor= {Lindsay, D. T.}, volume= {}, number= {}, series= {}, pages= {}, address= {}, month= {}, organization= {}, publisher= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{Par92, author= {Parker, D.}, title= {Seventeen information security myths debunked}, booktitle= {Proceedings of the ISSA Security Conference}, year= {1992}, editor= {}, volume= {}, number= {}, series= {}, pages= {}, address= {}, month= {}, organization= {}, publisher= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, } @inproceedings{Lan81, author= {Landwehr, C. E.}, title= {Formal models for computer security}, booktitle= {ACM: Computing Surveys}, year= {1981}, editor= {}, volume= {13(3)}, number= {}, series= {}, pages= {}, address= {}, month= {September}, organization= {}, publisher= {}, owner= {}, date= {}, comment= {keywords: Registrierung: status: ### USED ### Inhalt: }, }