W
W. Ford
Researcher at Mitre Corporation
Publications - 7
Citations - 460
W. Ford is an academic researcher from Mitre Corporation. The author has contributed to research in topics: Database design & Database schema. The author has an hindex of 6, co-authored 7 publications receiving 460 citations.
Papers
More filters
Patent
System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification
TL;DR: In this paper, the authors present an integrated architecture for an extended multilevel secure database management system, which processes security constraints to control certain unauthorized inferences through logical deduction upon queries by users.
Patent
Apparatus and method for the detection of security violations in multilevel secure databases
Bhavani Thuraisingham,W. Ford +1 more
TL;DR: In this article, a tool for assisting an operator to detect security violations in a multilevel secure database management system is presented, where security constraints are represented in conceptual structures, rules, or frames, and operator communication with the constraint representation is provided by a user interface.
Journal ArticleDOI
Security constraint processing in a multilevel secure distributed database management system
Bhavani Thuraisingham,W. Ford +1 more
TL;DR: Techniques for processing security constraints in a distributed environment during query, update, and database design operations are described by this work.
Journal ArticleDOI
Design and implementation of a database inference controller
TL;DR: This paper describes the design and prototype development of an Inference Controller for a MLS/DBMS that functions during query processing and describes some extensions to the inference controller so that an integrated solution can be provided to the problem.
Proceedings ArticleDOI
Security constraint processing during the update operation in a multilevel secure database management system
TL;DR: The authors describe in detail the design and implementation of a secure update processor which handles security constraints in a multilevel secure database management system.