Proceedings, 1993 IEEE Computer Society Symposium on Research in Security and Privacy, May 24-26, 1993, Oakland, California |
From inside the book
Results 1-3 of 7
Page 198
... primary key ( U ) , add - identifier ( U ) create table rule - of - engagement group ( rule - id , date - from ) primary key ( U ) , seq - num ( U ) , operation.operation - name ( foreign key on operation ) ( U ) , exercise.exercise ...
... primary key ( U ) , add - identifier ( U ) create table rule - of - engagement group ( rule - id , date - from ) primary key ( U ) , seq - num ( U ) , operation.operation - name ( foreign key on operation ) ( U ) , exercise.exercise ...
Page 199
... primary key . The path can be expressed equivalently in tuple relational cal- culus by the conjunction of a set . P of atomic formulas as follows : • For any node v ; in the path representing the pri- mary key of relation scheme ( R [ X ...
... primary key . The path can be expressed equivalently in tuple relational cal- culus by the conjunction of a set . P of atomic formulas as follows : • For any node v ; in the path representing the pri- mary key of relation scheme ( R [ X ...
Page 201
... key security property if • Primary key attributes A , A ' E K have the same classification : ( t , A ) = ( t , A ' ) ; and • The classification of each non - key attribute A E X - K dominates the classification of the primary key K ...
... key security property if • Primary key attributes A , A ' E K have the same classification : ( t , A ) = ( t , A ' ) ; and • The classification of each non - key attribute A E X - K dominates the classification of the primary key K ...
Contents
A RealTime Intrusion Detection System for UNIX | 16 |
Preventing Denial and Forgery of Causal Relationships in Distributed Systems | 30 |
Protocol Design for Integrity Protection | 41 |
Copyright | |
13 other sections not shown
Common terms and phrases
algorithm analysis Analyzer assumption atomicity attacker attribute audit authentication protocols authentication systems BAN logic causality clock commit Computer Security computer virus concurrency control constraints correct covert channel cryptographic protocols database defined denoted detect domain representation DTMach edge encryption entities example execution Figure foreign key formal function fuzzy graph honest implemented incident infected inference channels input inter-domain intruder ISBN kernel kill signal lfact low process m₁ Mach message type ML transactions multilevel Multilevel Secure multiversion node nonce operations packets pairwise path port primary key principal problem properties range representation received represent request requirements satisfy scheduling secret security kernel security level security policy semantic sender serializability server session key specification task Threshold tion token card transition trusted subject type enforcement uptick USTAT vertex cover problem virus viruses workstation