A MATHEMATICAL-PROGRAMMING MODEL FOR THE LOCATION OF ACCESS CONTROLS IN A DISTRIBUTED DATA-BASE ENVIRONMENT

被引:2
作者
BABAD, YM [1 ]
HOFFER, JA [1 ]
机构
[1] INDIANA UNIV,BLOOMINGTON,IN 47401
关键词
D O I
10.1287/opre.32.1.23
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
13
引用
收藏
页码:23 / 40
页数:18
相关论文
共 13 条
[1]   DATA ELEMENT SECURITY AND ITS EFFECTS ON FILE SEGMENTATION [J].
BABAD, YM ;
HOFFER, JA .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1980, 6 (05) :402-410
[2]  
BABAD YM, 1976, UNPUB SECURITY CONTR
[3]   IMPLEMENTATION OF SECURITY MEASURES IN INFORMATION-SYSTEMS [J].
CONWAY, RW ;
MORGAN, HL ;
MAXWELL, WL .
COMMUNICATIONS OF THE ACM, 1972, 15 (04) :211-&
[4]  
ELAM J, 1976, CCS279 U TEX CTR CYB
[5]  
FERNANDEZ EB, 1977, IBM G322693 LOS ANG
[6]  
LANG T, 1976, IBM G3202682 LOS ANG
[7]   DYNAMIC OPTIMIZATION MODEL FOR DISTRIBUTED DATABASES [J].
LEVIN, KD ;
MORGAN, HL .
OPERATIONS RESEARCH, 1978, 26 (05) :824-835
[8]  
LEVIN KD, 1974, THESIS U PENNSYLVANI
[9]   TRADE-OFFS OF SECURE PROCESSING IN CENTRALIZED VERSUS DISTRIBUTED NETWORKS [J].
LIENTZ, BP ;
WEISS, IR .
COMPUTER NETWORKS AND ISDN SYSTEMS, 1978, 2 (01) :35-43
[10]  
SCHKOLNICK M, 1978, RJ230631048 IBM RES