Skip to main content

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Garvey TD, Lunt TF (1992) Cover stories for database security. In: Landwehr CE, Jajodia S (eds) Database Security, V: Status and Prospects. Elsevier Science, North-Holland

    Google Scholar 

  2. Jajodia S, Sandhu R (1992) Polyinstantiation for cover stories. In: Proceedings of the Second European Symposium On Research In Computer Security, Toulouse, November 1992, pp 307–328

    Google Scholar 

  3. Jajodia S, Sandhu R (1991) Toward a multilevel secure relational data model. In: Proceedings ACM SIGMOD International Conference on Management of Data, ACM Press, Denver, CO, May 1991, pp 50–59

    Google Scholar 

  4. Lunt TF (1991) Polyinstantiation: An inevitable part of a multilevel world. In: Proceedings of the IEEE Workshop on Computer Security Foundations, Franconia, 18–20 June 1991, pp 236–238

    Google Scholar 

  5. Lunt TF, Denning DE, Schell RR, Heckman M, Shockley WR (1990) The SeaView security model. IEEE Trans Softw Eng 16(6):593–607

    Google Scholar 

  6. Qian X, Lunt TF (1996) A MAC policy framework for multilevel relational databases. IEEE Trans Knowl Data Eng 8(1):1–14

    Google Scholar 

  7. Samarati P, De Capitani di Vimercati S (2001) Access control: Policies, models, and mechanisms. In: Focardi R, Gorrieri R (eds) Foundations of Security Analysis and Design. Lecture Notes in Computer Science, vol 2171. Springer, Berlin

    Google Scholar 

  8. Sandhu R, Chen F (2000) The multilevel relational (MLR) data model. ACM Trans Inform Syst Secur (TISSEC) 1(1):93–132

    Google Scholar 

  9. Smith K, Winslet M (1992) Entity modeling in the MLS relational model. In: Proceedings of the 18th International Conference on Very Large Data Bases (VLDB 1992), Vancouver, August 1992

    Google Scholar 

  10. Winslett M, Smith K, Qian X (1994) Formal query languages for secure relational databases. ACM Trans Database Syst 19(4):626–662

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

De Capitani di Vimercati, S., Samarati, P. (2011). Polyinstantiation. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_682

Download citation

Publish with us

Policies and ethics