참고문헌
- C. Batini and S. B. Navathe, Conceptual Database Design, an Entity-Relationship Approach, Redwood City, CA, Benjamin Cummings, 1993
- Bums, R., 'ER Approach to Multilevel Database Design,' The 1st RADC Database Security Workshop Menlo park, CA, May 1988
- S. Ceri and P. Fraternali, Designing Database Applications with Objects and Rules,Addison-Wesley, 1997
- P. Chen, 'The Entity-Relationship Model: Toward a Unified View of Data,' ACM Transaction on Database Systems, Vo. 11, No. 1, pp.9-36, 1976 https://doi.org/10.1145/320434.320440
- D. Coleman, P. Arnold, S. Bodoff et. al., ObjectOriented Development : The Fusion Method, Englewood Cliffs, NJ, Prentice-Hall International, 1994
- D. E. Denning et al., Secure distributed data view: security policy and interpretation for class Al multilevel secure relational database system, Technical Report A002 SRI International, 1986
- D. E. Denning, Secure distributed data views : the Sea View formal security model, Technical Report A003 SRI international, 1987
- D. E. Denning, et. al., 'Views for multilevel database security,' IEEE Trans. Software Eng. 13(2), 1987
- D. E. Denning et al., 'The Sea View security model,' Proc. IEEE Symp, on Security and Privacy, Oakland, CA, April 1988 https://doi.org/10.1109/SECPRI.1988.8114
- R. Elmasri and S.B. Navathe, Fundamentals of Database Systems, Second edition, Benjamin/ Cummings, redwood City, 1994
- M. Fugini, 'Secure Database Development Methodologies,' Database Security : Status and Prospects, C. E. Landwehr, eds., North Holland(Elsevier), pp.103-130, 1988
- G. E. Gainak, 'Some Results from the EntityRelationship Multilevel Secure DBMS Project,' Proc. 4th IEEE Annual Computer Security Application Conference, 1988 https://doi.org/10.1109/ACSAC.1988.113419
- J. G. Hughes, Object-Oriented Databases, Computer Science, Prentice Hall, 1991
- D. G. Mark et al., 'Hypersemantic Data Modelling for Inference Analysis,' DATABASE SECURITY VII : Status and Prospects, North-Holland, pp.157-180, 1994.
- S. B. Navathe and M. K. Pillallmarri, 'OOER: Toward Making the ER Approach Object Oriented,' Proceedings of the 8th International Conference on Entity-Relationship Approach, pp.55-76, 1989
- B. H. Patkau, D. L. Tennenhouse, 'The Implementation of Secure Entity-Relationship Databases,' Proc. IEEE Symposium on Security and Privacy, 1985
- G. Pernul, A. M. Tjoa, 'A View Integration Approach for the Design of MLS Databases,' Proc. 10th Int'l. Conf. on the Entity-Relationship Approach, San Mateo, CA, Oct. 1991
- G. Pernul, 'Security Constraint Processing During Multilevel Secure Database Design,' Proc. 8th Annual Computer Security Applications Conference,' IEEE Computer Society Associations, pp.75-84, 1992 https://doi.org/10.1109/CSAC.1992.228231
- Sell, P., 'The SPEAR Data Design Methodology,' Proceedings of the 6th IFIP Database Security Conference, Vancouver, BC, August 1992
- P. J. Sell and B. M Thuraisingham, 'Applying OMT for Designing Multilevel Database Applications,' DATABASE SECURITY VII : Status and Prospects, North-Holland, pp.41-64, 1994
- Smith, G., 'Modelling Security Relevant Data Semantics,' Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1990
- G. W. Smith, 'The Semantic Data Model for Security : Representing the Security Semantics of an Applications,' Proc. of the 6th Int. Conf. on Data Engineering, 1990 https://doi.org/10.1109/ICDE.1990.113484
- I.Y. Song, 'A Survey of Object Oriented Database Design Methodologies,' Proceedings of the International Conference on Information and Knowledge Management, Baltimore, MD, pp.52-59, 1992
- L Y. Song and T. H. Jones, 'Analysis of Binary Relationships with Ternary Relationships in ER Modeling,' In Proceedings of 12th International Conference on Entity-Relationship Approach, Dallas, TX, December, pp.265-276, 1993
- I. Y. Song, T. H. Jones, and E. K. Park, 'Binary Relationship Imposition Rules on Ternary Relationships in ER Modeling,' In proceedings of 2nd International Conference on Information and knowledge management, Washington, D.C., October, pp.57-66, 1993 https://doi.org/10.1145/170088.170104
- D. Spooner, 'The Impact of Inheritance on Security in Object-Oriented Database Systems,' Database Security II : Status and Prospects, Ed : C. Landwehr) North-Holland, 1989
- T. J Teorey, Database Modeling and Design: The Fundamental Principles, 2nd Edition, MorganKauffman, 1994
- Wiseman, S., 'Abstract and Concrete Models for secure Database Applications,' Proceedings of the 5th IFIP Working Conference in Database Security, Shepherstown, W. VA, November 1991
- Thuraisingham, M. B., 'Mandatory security in object-oriented database systems,' Pro. Conf. on Object-oriented Programming : Systems, Languages, and Applications(OOPSLA), Orlando, October 1989 https://doi.org/10.1145/74877.74899
- T. H. Hinke, H. S. Delugach and R. Wolf, 'A Framework for Inference-Directed Data Mining,' DATABASE SECURITY Volume X : Status and Prospects, Chapman & Hall, pp.229-239, 1997
- K. Zhang, 'IRI : A Quantitative Approach to Inference Analysis in Relational Database,' DATABASE SECURITY XI : Status and Prospects, Chapman & Hall, pp.279-200, 1998
- 김영균,노봉남,'보안 객체 지식 모델에서 보안 제약 조건' 통신정보보호학회논문지,제3권,제1호,pp.48-57,1993
- 박선주,노봉남,'다단계 보안 멀티미디어 데이터 모델을 위한 보안 제약조건' 통신정보보호학회논문지,제3권, 제2호, pp.16-30, 1993