The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2000 (conf/dbsec/2000)

  1. Gio Wiederhold
    Protecting Information when Access is Granted for Collaboration. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:1-14 [Conf]
  2. Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, Marco Mesiti
    Author-X: A Java-Based System for XML Data Protection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:15-26 [Conf]
  3. Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy
    A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:27-38 [Conf]
  4. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    XML Access Control Systems: A Component-Based Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:39-50 [Conf]
  5. Alexandre Hardy, Martin S. Olivier
    A Configurable Security Architecture Prototype. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:51-62 [Conf]
  6. Susan Chapin, Donald B. Faatz, Sushil Jajodia
    Distributed Policies for Data Management Making Policies Mobile. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:63-76 [Conf]
  7. Christian Altenschmidt, Joachim Biskup, Yücel Karabulut
    Security Architecture of the Multimedia Mediator. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:77-88 [Conf]
  8. Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
    Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:89-100 [Conf]
  9. Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
    Authentic Third-party Data Publication. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:101-112 [Conf]
  10. Daniel Barbará, Rajni Goel, Sushil Jajodia
    Protecting File systems Against Corruption Using Checksums. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:113-124 [Conf]
  11. Bhavani M. Thuraisingham
    Web Security and Privacy (Panel). [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:125-126 [Conf]
  12. Ken Moody
    Coordinating Policy for Federated Applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:127-134 [Conf]
  13. Marta Oliva, Fèlix Saltor
    Integrating Security Policies in Federated Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:135-148 [Conf]
  14. Martin S. Olivier, Ehud Gudes
    Wrappers - a mechanism to support state-based authorisation in Web applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:149-160 [Conf]
  15. LiWu Chang, Ira S. Moskowitz
    An Integrated Framework for Database Privacy Protection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:161-172 [Conf]
  16. Christina Yip Chung, Michael Gertz, Karl N. Levitt
    Discovery of Multi-Level Security Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:173-184 [Conf]
  17. Steve Barker
    Protecting Deductive Databases from Unauthorized Retrievals. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:185-196 [Conf]
  18. Marc Donner, David Nochin, Dennis Shasha, Wendy Walasek
    Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:195-316 [Conf]
  19. Adrian Spalka, Armin B. Cremers
    Confidentiality vs. Integrity in Secure Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:197-208 [Conf]
  20. Arnon Rosenthal, Edward Sciore
    Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:209-220 [Conf]
  21. John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi
    Language Extensions for Programmable Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:221-232 [Conf]
  22. Soon Ae Chun, Vijayalakshmi Atluri
    Protecting Privacy from Continuous High-resolution Satellite Surveillance. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:233-244 [Conf]
  23. Sylvia L. Osborn
    Database Security Integration using Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:245-258 [Conf]
  24. Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr
    Role-Based Security in a Distributed Resource Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:259-270 [Conf]
  25. Wouter Teepe, Reind P. van de Riet, Martin S. Olivier
    WorkFlow Analyzed for Security and Privacy in using Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:271-282 [Conf]
  26. Jürgen Steger, Holger Günzel, Andreas Bauer 0004
    Identifying Security Holes in OLAP Applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:283-294 [Conf]
  27. John R. Campbell
    Database Security 2000. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:317-322 [Conf]
  28. Hasan M. Jamil
    Declarative Semantics of Belief Queries in MLS Deductive Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:323-328 [Conf]
  29. James Bret Michael, Leonard T. Gaines
    Trust Management in Distributed Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:329-338 [Conf]
  30. Daniel Cvrcek
    Active Access Control as High-Level Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:339-346 [Conf]
  31. Ari Moesriami Barmawi, Shingo Takada, Norihisa Doi
    Conference Key Agreement Protocol Using Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:347-354 [Conf]
  32. Sejong Oh, Seog Park
    An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:355-360 [Conf]
  33. Keiji Izaki, Katsuya Tanaka, Makoto Takizawa
    Access Control Model in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:361-366 [Conf]
  34. Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold
    Panel. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:373- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002