Conferences in DBLP
Gio Wiederhold Protecting Information when Access is Granted for Collaboration. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:1-14 [Conf ] Elisa Bertino , M. Braun , Silvana Castano , Elena Ferrari , Marco Mesiti Author-X: A Java-Based System for XML Data Protection. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:15-26 [Conf ] Indrajit Ray , Indrakshi Ray , Natarajan Narasimhamurthy A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:27-38 [Conf ] Ernesto Damiani , Sabrina De Capitani di Vimercati , Stefano Paraboschi , Pierangela Samarati XML Access Control Systems: A Component-Based Approach. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:39-50 [Conf ] Alexandre Hardy , Martin S. Olivier A Configurable Security Architecture Prototype. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:51-62 [Conf ] Susan Chapin , Donald B. Faatz , Sushil Jajodia Distributed Policies for Data Management Making Policies Mobile. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:63-76 [Conf ] Christian Altenschmidt , Joachim Biskup , Yücel Karabulut Security Architecture of the Multimedia Mediator. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:77-88 [Conf ] Mauricio Papa , Oliver Bremer , Stephen Magill , John Hale , Sujeet Shenoi Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:89-100 [Conf ] Premkumar T. Devanbu , Michael Gertz , Charles U. Martel , Stuart G. Stubblebine Authentic Third-party Data Publication. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:101-112 [Conf ] Daniel Barbará , Rajni Goel , Sushil Jajodia Protecting File systems Against Corruption Using Checksums. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:113-124 [Conf ] Bhavani M. Thuraisingham Web Security and Privacy (Panel). [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:125-126 [Conf ] Ken Moody Coordinating Policy for Federated Applications. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:127-134 [Conf ] Marta Oliva , Fèlix Saltor Integrating Security Policies in Federated Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:135-148 [Conf ] Martin S. Olivier , Ehud Gudes Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:149-160 [Conf ] LiWu Chang , Ira S. Moskowitz An Integrated Framework for Database Privacy Protection. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:161-172 [Conf ] Christina Yip Chung , Michael Gertz , Karl N. Levitt Discovery of Multi-Level Security Policies. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:173-184 [Conf ] Steve Barker Protecting Deductive Databases from Unauthorized Retrievals. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:185-196 [Conf ] Marc Donner , David Nochin , Dennis Shasha , Wendy Walasek Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:195-316 [Conf ] Adrian Spalka , Armin B. Cremers Confidentiality vs. Integrity in Secure Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:197-208 [Conf ] Arnon Rosenthal , Edward Sciore Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:209-220 [Conf ] John Hale , Rodrigo Chandia , Clinton Campbell , Sujeet Shenoi Language Extensions for Programmable Security. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:221-232 [Conf ] Soon Ae Chun , Vijayalakshmi Atluri Protecting Privacy from Continuous High-resolution Satellite Surveillance. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:233-244 [Conf ] Sylvia L. Osborn Database Security Integration using Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:245-258 [Conf ] Steven A. Demurjian , T. C. Ting , J. Balthazar , H. Ren , Charles E. Phillips , Paul Barr Role-Based Security in a Distributed Resource Environment. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:259-270 [Conf ] Wouter Teepe , Reind P. van de Riet , Martin S. Olivier WorkFlow Analyzed for Security and Privacy in using Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:271-282 [Conf ] Jürgen Steger , Holger Günzel , Andreas Bauer 0004 Identifying Security Holes in OLAP Applications. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:283-294 [Conf ] John R. Campbell Database Security 2000. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:317-322 [Conf ] Hasan M. Jamil Declarative Semantics of Belief Queries in MLS Deductive Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:323-328 [Conf ] James Bret Michael , Leonard T. Gaines Trust Management in Distributed Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:329-338 [Conf ] Daniel Cvrcek Active Access Control as High-Level Control. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:339-346 [Conf ] Ari Moesriami Barmawi , Shingo Takada , Norihisa Doi Conference Key Agreement Protocol Using Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:347-354 [Conf ] Sejong Oh , Seog Park An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:355-360 [Conf ] Keiji Izaki , Katsuya Tanaka , Makoto Takizawa Access Control Model in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:361-366 [Conf ] Reind P. van de Riet , Raban Serban , Sylvia L. Osborn , Arnon Rosenthal , Vijayalakshmi Atluri , Joachim Biskup , Gio Wiederhold Panel. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:373- [Conf ]