R. Wong, "A Comparison of Secure UNIX Operating System", 1990 Computer Security Applications Conference, pp. 322-333. |
M. Collins et al., "Security Constraint Processing During the Update Operation in aMultilevel Secure Database Management System", 1991 Computer Security Applications Conference, pp. 23-32. |
E. Fernandez et al., "A Model for Evaluation and Administration of Security in Object-Oriented Databases", IEEE Transactions on Knowledge+Data Engineering vol. 6 Issue 2, Apr. 1994, pp. 275-292. |
S. Kang et al., "An Integrated Access Control in Heterogeneous Distributed Database Systems", 1992 IEEE Region 10 Conference on Technology Enabling, pp. 222-226. |
Y. Oki et al., "A Design Method for Data Integrity in Object-Oriented Database Systems," 1995 Information Engineering, pp. 204-209. |
Mitze Bob, "Security through software", Nov. 1989, Exe, V4, N6, p. 53(1). |
Elsevier Advanced Technology Publications, "Trusted Orade 7", Computer Fraud & Security Bulletin, Mar. 1994, p. 1. |
"Configurable Mandatory Access Control Subsystem", IBM Technical Disclosure Bulletin, V. 34, N. 12, May 1992 pp. 121-123. |
Data General Corporation Customer Documentation, 'Using Security Features on the Trusted DG/UX.TM. System 093-701137-00, Jul. 1994. |
Data General Corporation Customer Documentation, Managing Security on the Trusted DG/UX.TM. System 093-701138-00, Jul. 1994. |
Data General Corporation Customer Documentation, Managing Auditing on the Trusted DG/UX.TM. System 093-701139-00, Jul. 1994. |