Security Model for Object Oriented Applications
Amanpreet Kaur1
Section:Research Paper, Product Type: Journal Paper
Volume-4 ,
Issue-7 , Page no. 60-65, Jul-2016
Online published on Jul 31, 2016
Copyright © Amanpreet Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Amanpreet Kaur, “Security Model for Object Oriented Applications,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.60-65, 2016.
MLA Style Citation: Amanpreet Kaur "Security Model for Object Oriented Applications." International Journal of Computer Sciences and Engineering 4.7 (2016): 60-65.
APA Style Citation: Amanpreet Kaur, (2016). Security Model for Object Oriented Applications. International Journal of Computer Sciences and Engineering, 4(7), 60-65.
BibTex Style Citation:
@article{Kaur_2016,
author = {Amanpreet Kaur},
title = {Security Model for Object Oriented Applications},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2016},
volume = {4},
Issue = {7},
month = {7},
year = {2016},
issn = {2347-2693},
pages = {60-65},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1001},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1001
TI - Security Model for Object Oriented Applications
T2 - International Journal of Computer Sciences and Engineering
AU - Amanpreet Kaur
PY - 2016
DA - 2016/07/31
PB - IJCSE, Indore, INDIA
SP - 60-65
IS - 7
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
2082 | 1600 downloads | 1599 downloads |
Abstract
Object oriented platform allow us to create ‘n’ number of objects of a class without imposing any constraints. By taking advantage of this feature, unknown objects of known and unknown classes can also be created in an application by the intruder. This paper presents a security model for object oriented platform to overcome such issues. In this paper, I have raised security issues related to object oriented applications. I have also discussed the needs of security for these applications.
Key-Words / Index Term
Inheritance; Object; Unknown classes; Unknown Objects
References
[1 ] E.B. Fernandez, R.C. Summers, and C. Wood, “Database Security and Integrity,” Addison-Wesley, February 1981.
[2 ] T.F. Keefe, “SODA: A Security Model For Object-oriented Management Systems”, Proceedings of 15th International Computer Software and Applications Conference, Tokyo, Japan, September 1991.
[3 ] Jonathan K. Millen and Teresa F. Lunt, “Security for Object-Oriented Database Systems,” IEEE 1992.
[4 ] Elisa Bertino, “Data Hiding and Security in Object-Oriented Databases”, Eighth International Conference on Data Engineering, 338-347, February 1992.
[5 ] Juhnyoung Lee, Sang H.Son, Myung-Joon Lee, “Issues in devolving object-oriented databases systems for real-time applications,” IEEE 1994.
[6 ] Y. Oki, T. Chikaraishi, T. Shimomura and T. Ohta, “A Design Method for Data Integrity in Object-Oriented Database Systems,” IEEE 1995.
[7 ] Roshan K. Thomas and Ravi S. Sandhu, “A Trusted Subject Architecture for Multilevel Secure Object-Oriented Database,” IEEE Transactions on Knowledge and Data Engineering, Vol. 8, No. 1, February 1996.
[8 ] Elisa Bertino and Ravi Sandhu, “Database Security-Concepts, Approaches, and Challenges”, IEEE Transactions on Dependable and Secure Computing, Vol. 2, No.1, January-March 2005.
[9 ] Ni Xianjun, “A Logic Specification and Implementation Approach for Object Oriented Database Security,” Workshop on Knowledge Discovery and Data Mining, IEEE 2008.
[10 ] Sohail IMRAN and Dr. Irfan Hyder, “Security Issues in Databases”, Second International Conference on Future Information Technology and Management EngineeringIEEE 2009.
[11 ] Leon Pan, “A Unified Network Security and Fine-Grained Database Access Control Model,” Second International Symposium on Electronic Commerce and Security, 2009.
[12 ] Mansaf Alam “Access specifiers Model for Data Security in Object Oriented Databases,”Eighth International Conference on Information Technology: New Generations, IEEE 2011.
[13 ] Hussain Al-Aqrabi; Lu Liu; Richard Hill; Zhijun Ding; Nick Antonopoulos“Buisness Intelligence Security on clouds:Challenges,Solutions and Future Directions”,IEEE 2013
[14 ] Nitish Pathak; Girish Sharma; B. M. Singh “Designing of SPF based secure web application using forward engineering”,IEEE 2015.
[15 ] S. Nagaparameshwara Chary, B.Ram “Analysis of Classification Technique Algorithms in Data mining- A Review“,IJCSE 2016.