The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2008 (conf/dbsec/2008)


  1. Dynamic Meta-level Access Control in SQL. [Citation Graph (, )][DBLP]


  2. On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. [Citation Graph (, )][DBLP]


  3. A Unified Audit Expression Model for Auditing SQL Queries. [Citation Graph (, )][DBLP]


  4. A New Approach to Secure Logging. [Citation Graph (, )][DBLP]


  5. Security, Functionality and Scale? [Citation Graph (, )][DBLP]


  6. P4A: A New Privacy Model for XML. [Citation Graph (, )][DBLP]


  7. Privacy-Aware Collaborative Access Control in Web-Based Social Networks. [Citation Graph (, )][DBLP]


  8. A Privacy-Preserving Ticketing System. [Citation Graph (, )][DBLP]


  9. The Analysis of Windows Vista Disk Encryption Algorithm. [Citation Graph (, )][DBLP]


  10. Shared and Searchable Encrypted Data for Untrusted Servers. [Citation Graph (, )][DBLP]


  11. Secure Construction of Contingency Tables from Distributed Data. [Citation Graph (, )][DBLP]


  12. Web Services Security: Techniques and Challenges (Extended Abstract). [Citation Graph (, )][DBLP]


  13. Empirical Analysis of Certificate Revocation Lists. [Citation Graph (, )][DBLP]


  14. Using New Tools for Certificate Repositories Generation in MANETs. [Citation Graph (, )][DBLP]


  15. Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. [Citation Graph (, )][DBLP]


  16. Protecting the Publishing Identity in Multiple Tuples. [Citation Graph (, )][DBLP]


  17. Panel Session: What Are the Key Challenges in Distributed Security?. [Citation Graph (, )][DBLP]


  18. On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. [Citation Graph (, )][DBLP]


  19. Sharing but Protecting Content Against Internal Leakage for Organisations. [Citation Graph (, )][DBLP]


  20. Regulating Exceptions in Healthcare Using Policy Spaces. [Citation Graph (, )][DBLP]


  21. Towards Automation of Testing High-Level Security Properties. [Citation Graph (, )][DBLP]


  22. An Attack Graph-Based Probabilistic Security Metric. [Citation Graph (, )][DBLP]


  23. An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. [Citation Graph (, )][DBLP]


  24. DIWeDa - Detecting Intrusions in Web Databases. [Citation Graph (, )][DBLP]


  25. Securing Workflows with XACML, RDF and BPEL. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002