Rabotti, F., et al., "A Model of Authorization for Object-Oriented and Semantic Databases," Proc. Intl. Conf. on Extending Database Technology, Venice, Italy, Mar. 1988, pp. 231-250. |
Kim, Won. Introduction to Object-Oriented Databases, Chpt. 8, The MIT Press, 1990, pp. 90-106. |
Spooner, David L., "The Impact of Inheritance on Security in Object-Oriented Database Systems," Report, Computer Science Department, Rensselaer Polytechnic Institute, Nov. 1988, pp. 1-11. |
Fernandez, Eduardo B., et al., "Definition and Evaluation of Access Rules in Data Management Systems," Proceedings 1st International Conference on Very Large Databases, Boston, 1975, pp. 268-285. |
Vinter, Stephen T., "Extended Discretionary Access Controls," Proceedings of the 1988 Symposium on Security and Privacy, IEEE Comput. Soc. Press, Apr. 1988, pp. 39-49. |
Shimizu, Kentaro, et al., "Hierarchical Object Groups in Distributed Operating Systems," 8th International Conference on Distributed Computing Systems, IEEE Comput. Soc. Press, Jun. 1988, pp. 18-24. |
E. B. Fernandez et al, "A Security Model for Object Oriented Databases", 1989 IEEE Computer Society Symposium on Security and Privacy, May 3, 1989, pp. 110-115. |
Object Oriented System Supporting Dynamic Configuration, H. J. M. Decuypere, 1986. |
Domains: A New Approach to Distributed System Management, D. C. Robinson & M. S. Sloman, 1988. |
Integrating an Object Server with Other Worlds, A. Purdy & B. Schuchardt, ACM Transactions, vol. 5, No. 1, Jan. 1987. |
Data Model Issues for Object-Oriented Applications, J. Banerjee et al, ACM Transactions, vol. 5, No. 1, Jan. 1987. |
Enhancing the Object-Oriented Concepts for Database Support, Won Kim et al, IEEE, 1987. |
Access Control for a Shared Data Base, R. J. Bamford & D. M. Choy IBM TDB, vol. 23, No. 4, Sep. 1980. |
1986 International Workshop on Object-Oriented Database Systems, Sep. 1986. |