Foundations of Databases, 1995. ,
Secure computer systems: A mathematical model, volume II, Journal of Computer Security, vol.4, issue.23, pp.229-263, 1974. ,
A logic-based approach for enforcing access control, Journal of Computer Security, vol.8, issue.2, 2000. ,
Security in Computing Systems ? Challenges, Approaches and Solutions, 2009. ,
Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution, Databases in Networked Information Systems, pp.80-106, 2010. ,
DOI : 10.1007/978-3-642-12038-1_7
Controlled query evaluation for enforcing confidentiality in complete information systems, International Journal of Information Security, vol.8, issue.1, pp.14-27, 2004. ,
DOI : 10.1145/319830.319833
Protection of Database Security Via Collaborative Inference Detection, IEEE Trans. Knowl. Data Eng, vol.20, issue.8, pp.1013-1027, 2008. ,
DOI : 10.1007/978-3-540-69209-6_15
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001. ,
DOI : 10.1145/383891.383894
A Theory of Runtime Enforcement, with Results, European Symposium on Research in Computer Security, ESORICS 2010, pp.87-100, 2010. ,
DOI : 10.1007/978-3-642-15497-3_6
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853
Answering queries without revealing secrets, ACM Transactions on Database Systems, vol.8, issue.1, pp.41-59, 1983. ,
DOI : 10.1145/319830.319833