Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Garvey TD, Lunt TF (1992) Cover stories for database security. In: Landwehr CE, Jajodia S (eds) Database Security, V: Status and Prospects. Elsevier Science, North-Holland
Jajodia S, Sandhu R (1992) Polyinstantiation for cover stories. In: Proceedings of the Second European Symposium On Research In Computer Security, Toulouse, November 1992, pp 307–328
Jajodia S, Sandhu R (1991) Toward a multilevel secure relational data model. In: Proceedings ACM SIGMOD International Conference on Management of Data, ACM Press, Denver, CO, May 1991, pp 50–59
Lunt TF (1991) Polyinstantiation: An inevitable part of a multilevel world. In: Proceedings of the IEEE Workshop on Computer Security Foundations, Franconia, 18–20 June 1991, pp 236–238
Lunt TF, Denning DE, Schell RR, Heckman M, Shockley WR (1990) The SeaView security model. IEEE Trans Softw Eng 16(6):593–607
Qian X, Lunt TF (1996) A MAC policy framework for multilevel relational databases. IEEE Trans Knowl Data Eng 8(1):1–14
Samarati P, De Capitani di Vimercati S (2001) Access control: Policies, models, and mechanisms. In: Focardi R, Gorrieri R (eds) Foundations of Security Analysis and Design. Lecture Notes in Computer Science, vol 2171. Springer, Berlin
Sandhu R, Chen F (2000) The multilevel relational (MLR) data model. ACM Trans Inform Syst Secur (TISSEC) 1(1):93–132
Smith K, Winslet M (1992) Entity modeling in the MLS relational model. In: Proceedings of the 18th International Conference on Very Large Data Bases (VLDB 1992), Vancouver, August 1992
Winslett M, Smith K, Qian X (1994) Formal query languages for secure relational databases. ACM Trans Database Syst 19(4):626–662
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
De Capitani di Vimercati, S., Samarati, P. (2011). Polyinstantiation. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_682
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_682
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering