0
Views
0
CrossRef citations to date
0
Altmetric
Articles

Security for Next Generation Hypertext Systems

&
Pages 1-18 | Published online: 29 Oct 2018

REFERENCES

  • FOSS, C.L. Tools for reading and browsing hypertext. Information Processing and Management, 25(4), 1989.
  • MARCHIONINI, G. and SHNEIDERMAN, B. Finding Facts vs. Browsing in Hypertext Systems. IEEE Computer, 27(1), 1988.
  • NIELSEN, J. The art of navigating through hypertext. Communications of the ACM, 33(3), 1990.
  • TOMEK, I. and MAURER, H. Helping the user to select a link. Hypermedia, 4(2), 1992.
  • TRIGG, R. H. Guided Tours and Tablestops: Tools for Communicating in a Hypertext Environment; ACM Trans, on Office Information Systems (TOIS), 6(4), 1988.
  • PERNUL, G. and TJOA, A. M. Database Security Policies; Proceedings of the Int'l Conf. on Safety and Reliability of Computers (SAFECOMP-92), Pergamon Press, 1992.
  • PERNUL, G. and LUEF, G. A Bibliography on Database Security. ACM SIGMOD Record, 21(1), 1992.
  • CONKLIN, J. Hypertext - An introduction and survey. IEEE Computer, 20(1), 1987.
  • HALL, P.A.V. and PAPADOPOULOS, S. Hypertext systems and applications. Information and Software Technology, 32(1), 1990.
  • NIELSEN, J. Hypertext and Hypermedia. Academic Press, San Diego, CA, 1990.
  • FERNANDEZ, E. B., SUMMERS, R. C. and WOOD, C. Database Security and Integrity. Addison-Wesley, Reading, Mass, 1981.
  • LUNT, T. F. Security in Database Systems: A Research Perspective. Computers & Security, 11, 1992.
  • YANKELOVICH, N., HAAN, B., MEYROWITZ, N. and DRUCKER, S. M. Intermedia: The Concept and the Construction of a Seamless Information Environment. IEEE Computer, 21(1), 1988.
  • BELL, D. E. and LAPADULA, L. J. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, MITRE Corp., Bedford, Mass, 1976.
  • LANDWEHR, C. E. Formal Models for Computer Security. ACM Computing Surveys, 13(2), 1981.
  • MILLEN, J. K. Models of Multilevel Computer Security, in: Advances in Computers (M. C. YOVITS, ed.), 29, Academic Press, San Diego, CA, 1989.
  • CLARK, D. D. and WILSON, D. R. A Comparison of Commercial and Military Computer Security Policies. Proceedings of the IEEE Symposium on Research in Security and Privacy, 1987.
  • BISKUP, J. and BR<GGEMANN, H. H. The Personal Model of Data: Towards a Privacy Oriented Information System. Computers & Security, 7, 1988.
  • BISKUP, J. and BR<GGEMANN, H. H. The Personal Model of Data: Towards a Privacy Oriented Information System (extended abstract). Proceedings of the 5th Int'l Conference on Data Engineering, IEEE Computer Society Press, 1989.
  • Trusted Computer System Evaluation Criteria. US National Computer Security Center, Technical Report DoD 5200.28-STD, 1985.
  • Information Technology Security Evaluation Criteria (ITSEC). Provisional Harmonized Criteria. Commission of the European Communities, Brussels, June 1991.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.