12
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

An object-based version of the path context model

&
Pages 133-144 | Received 28 Jan 1992, Published online: 19 Mar 2007

References

  • Bell D . E. LaPadula L. J. Secure computer system: unified exposition and Multics interpretation MITRE Corporation March 1976 572 Rep. ESD-TR-75-306
  • Boshoff , W. H. and von Solms , S. H. 1989 . A path context model for addressing security in potentially non-secure environments . Computers & Security , 8 : 417 – 425 .
  • Boshoff , W. H. and Robson , D. 1989 . A Path Context Model for Computer Security Phenomena in Potentially Non-Secure Environments , Rand Afrikaans University . Ph. D. Dissertation
  • Boshoff , W. H. and von Solms , S. H. 1990 . Application of a path context approach to computer security fundamentals . Information Age , 12 ( 2 ) April : 83 – 90 .
  • Goldberg , A. and Robson , D. 1983 . Smalltalk 80: The Language and its Implementation , Addison-Wesley .
  • Landwehr , C. E. , ed. 1989 . Database Security II: Status and Prospects , North-Holland .
  • Olivier , M. S. and von Solms , S. H. 1992 . Building a secure database using self-protecting objects . Computers & Security , 11 ( 3 ) May : 259 – 271 .
  • Olivier M. S. von Solms S. H. A taxonomy for secure object-oriented databases ACM Transactions on Database Systems to appear
  • Pfleeger , C. P. 1989 . “ Security in Computing ” . Prentice-Hall .
  • Spooner , D. L. and von Solms , S. H. 1989 . The impact of inheritance on security in object-oriented database systems , 6 ( 2 ) : 141 – 150 .
  • Spooner , D. L. 1990 . Database Security III: Status and Prospects , Edited by: Landwehr , C. North-Holland .
  • Van der Walt , A. P. J. 1970 . Random context languages . Symposium on Formal Languages . 1970 , Oberwolfach, West Germany.
  • Wegner , P. 1990 . Concepts and paradigms of object-oriented programming . OOPS Messenger , 1 ( 1 ) 7 – 87 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.