{"id":"https://openalex.org/W1583039402","doi":"https://doi.org/10.1109/icde.1987.7272419","title":"Computer architectures, database security, and an evaluation metric","display_name":"Computer architectures, database security, and an evaluation metric","publication_year":1987,"publication_date":"1987-02-01","ids":{"openalex":"https://openalex.org/W1583039402","doi":"https://doi.org/10.1109/icde.1987.7272419","mag":"1583039402"},"language":"en","primary_location":{"id":"doi:10.1109/icde.1987.7272419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icde.1987.7272419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"1987 IEEE Third International Conference on Data Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114033361","display_name":"Ronda R. Henning","orcid":null},"institutions":[{"id":"https://openalex.org/I130440993","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32","country_code":"US","type":"government","lineage":["https://openalex.org/I130440993","https://openalex.org/I1330347796"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ronda R. Henning","raw_affiliation_strings":["National Computer Security Center, Office of Research and Development, C3, 9800 Savage Road, Fort George G. Meade, MD 20755-6000, United States"],"affiliations":[{"raw_affiliation_string":"National Computer Security Center, Office of Research and Development, C3, 9800 Savage Road, Fort George G. Meade, MD 20755-6000, United States","institution_ids":["https://openalex.org/I130440993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029037900","display_name":"B. Hubbard","orcid":null},"institutions":[{"id":"https://openalex.org/I130440993","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32","country_code":"US","type":"government","lineage":["https://openalex.org/I130440993","https://openalex.org/I1330347796"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian S. Hubbard","raw_affiliation_strings":["National Computer Security Center, Office of Research and Development, C3, 9800 Savage Road, Fort George G. Meade, MD 20755-6000, United States"],"affiliations":[{"raw_affiliation_string":"National Computer Security Center, Office of Research and Development, C3, 9800 Savage Road, Fort George G. Meade, MD 20755-6000, United States","institution_ids":["https://openalex.org/I130440993"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010813118","display_name":"Swen A. Walker","orcid":null},"institutions":[{"id":"https://openalex.org/I130440993","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32","country_code":"US","type":"government","lineage":["https://openalex.org/I130440993","https://openalex.org/I1330347796"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Swen A. Walker","raw_affiliation_strings":["National Computer Security Center, Office of Research and Development, C3, 9800 Savage Road, Fort George G. Meade, MD 20755-6000, United States"],"affiliations":[{"raw_affiliation_string":"National Computer Security Center, Office of Research and Development, C3, 9800 Savage Road, Fort George G. Meade, MD 20755-6000, United States","institution_ids":["https://openalex.org/I130440993"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5114033361"],"corresponding_institution_ids":["https://openalex.org/I130440993"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.15302423,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"518","last_page":"525"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9215999841690063,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9142000079154968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.797192394733429},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6489694714546204},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.6458463668823242},{"id":"https://openalex.org/keywords/database-security","display_name":"Database security","score":0.6322333812713623},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.606533944606781},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5570778250694275},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4903676509857178},{"id":"https://openalex.org/keywords/database-testing","display_name":"Database testing","score":0.4797183871269226},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4727821350097656},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.45829400420188904},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.45727068185806274},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.44906866550445557},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.43905341625213623},{"id":"https://openalex.org/keywords/trusted-computing-base","display_name":"Trusted computing base","score":0.411590039730072},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3312247395515442},{"id":"https://openalex.org/keywords/database-design","display_name":"Database design","score":0.29598790407180786},{"id":"https://openalex.org/keywords/database-schema","display_name":"Database schema","score":0.2569639980792999},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13437679409980774},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12897324562072754},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12284284830093384}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.797192394733429},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6489694714546204},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.6458463668823242},{"id":"https://openalex.org/C2778553114","wikidata":"https://www.wikidata.org/wiki/Q1035293","display_name":"Database security","level":2,"score":0.6322333812713623},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.606533944606781},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5570778250694275},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4903676509857178},{"id":"https://openalex.org/C78161392","wikidata":"https://www.wikidata.org/wiki/Q5227414","display_name":"Database testing","level":4,"score":0.4797183871269226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4727821350097656},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.45829400420188904},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.45727068185806274},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.44906866550445557},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.43905341625213623},{"id":"https://openalex.org/C147346212","wikidata":"https://www.wikidata.org/wiki/Q5492632","display_name":"Trusted computing base","level":4,"score":0.411590039730072},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3312247395515442},{"id":"https://openalex.org/C148840519","wikidata":"https://www.wikidata.org/wiki/Q1049878","display_name":"Database design","level":2,"score":0.29598790407180786},{"id":"https://openalex.org/C30775581","wikidata":"https://www.wikidata.org/wiki/Q632285","display_name":"Database schema","level":3,"score":0.2569639980792999},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13437679409980774},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12897324562072754},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12284284830093384},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icde.1987.7272419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icde.1987.7272419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"1987 IEEE Third International Conference on Data Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2563146846","https://openalex.org/W2763899992","https://openalex.org/W2998585934","https://openalex.org/W2349570899","https://openalex.org/W1603211808","https://openalex.org/W2387206097","https://openalex.org/W2740777444","https://openalex.org/W2919458629","https://openalex.org/W2381724863","https://openalex.org/W2352076113"],"abstract_inverted_index":{"There":[0],"are":[1,26],"various":[2],"computer":[3],"architectures":[4],"that":[5,69],"will":[6],"support":[7],"database":[8,19,60,71,111],"management":[9,20,61,72],"applications.":[10,38],"The":[11,39],"distinction":[12],"between":[13,48],"the":[14,45,49,54,64,87,94],"security":[15,35,46,56,67,88,112],"concerns":[16],"of":[17,77,90,96],"a":[18,59,70],"system":[21,25,66,73],"and":[22,63],"an":[23,91],"operating":[24,65,92],"not":[27],"well":[28],"defined.":[29],"Both":[30],"can":[31],"provide":[32],"same":[33],"data":[34],"to":[36,43,78,110],"user":[37],"question":[40],"is":[41,103,106],"how":[42],"divide":[44],"controls":[47],"two.":[50],"This":[51],"paper":[52],"details":[53],"fundamental":[55],"requirements":[57],"for":[58,85],"system,":[62,93],"features":[68],"could":[74],"take":[75],"advantage":[76],"enhance":[79],"its":[80,107],"own":[81],"security.":[82],"A":[83],"metric":[84],"quantifying":[86],"functions":[89],"Department":[95],"Defense":[97],"Trusted":[98],"Computer":[99],"Systems":[100],"Evaluation":[101],"Criteria,":[102],"discussed,":[104],"as":[105],"potential":[108],"application":[109],"assessment.":[113]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
