@inproceedings{4618b90ca5794b68af864aedc842b8d2,
title = "Security model consistency in secure object-oriented systems",
abstract = "Three techniques for evaluating the logical consistency of an object-oriented database security model are examined. The first technique consists of judging the model with respect to a set of general consistency properties for database security models. The second technique compares the SODA (secure object-oriented database) model against two other database security models. The third technique consists of defining a set of entities and mechanisms fundamental to the object-oriented model and considering the effect of the security model on them. Each of these techniques is applied to the SODA security model and is evaluated with respect to applicability, difficulty, and usefulness. Using the results of this analysis, the consistency of the SODA security model is characterized.",
author = "Keefe, {T. F.} and Tsai, {W. T.}",
year = "1989",
month = dec,
day = "1",
language = "English (US)",
isbn = "0818620064",
series = "Annual Computer Security Applications Conference",
publisher = "Publ by IEEE",
pages = "290--298",
editor = "Anon",
booktitle = "Fifth Annu Comput Secur Appl Conf",
note = "Fifth Annual Computer Security Applications Conference ; Conference date: 04-12-1989 Through 08-12-1989",
}