The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2009 (conf/dbsec/2009)

  1. Controlled Query Evaluation and Inference-Free View Updates. [Citation Graph (, )][DBLP]

  2. Implementing Reflective Access Control in SQL. [Citation Graph (, )][DBLP]

  3. An Approach to Security Policy Configuration Using Semantic Threat Graphs. [Citation Graph (, )][DBLP]

  4. Reaction Policy Model Based on Dynamic Organizations and Threat Context. [Citation Graph (, )][DBLP]

  5. Towards System Integrity Protection with Graph-Based Policy Analysis. [Citation Graph (, )][DBLP]

  6. Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. [Citation Graph (, )][DBLP]

  7. Privacy-Preserving Telemonitoring for eHealth. [Citation Graph (, )][DBLP]

  8. Analysis of Data Dependency Based Intrusion Detection System. [Citation Graph (, )][DBLP]

  9. Secure Method Calls by Instrumenting Bytecode with Aspects. [Citation Graph (, )][DBLP]

  10. Distributed Privilege Enforcement in PACS. [Citation Graph (, )][DBLP]

  11. Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. [Citation Graph (, )][DBLP]

  12. Using Edit Automata for Rewriting-Based Security Enforcement. [Citation Graph (, )][DBLP]

  13. Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers. [Citation Graph (, )][DBLP]

  14. Detecting Inference Channels in Private Multimedia Data via Social Networks. [Citation Graph (, )][DBLP]

  15. Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. [Citation Graph (, )][DBLP]

  16. Data Is Key: Introducing the Data-Based Access Control Paradigm. [Citation Graph (, )][DBLP]

  17. Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology. [Citation Graph (, )][DBLP]

  18. PAES: Policy-Based Authority Evaluation Scheme. [Citation Graph (, )][DBLP]

  19. Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. [Citation Graph (, )][DBLP]

  20. Methods for Computing Trust and Reputation While Preserving Privacy. [Citation Graph (, )][DBLP]

  21. Building an Application Data Behavior Model for Intrusion Detection. [Citation Graph (, )][DBLP]

  22. A Trust-Based Access Control Model for Pervasive Computing Applications. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002