Conferences in DBLP
Thomas L. Lincoln , Daniel Essin The Computer-Based Patient Record: Issues of Organization, Security and Confidentiality. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:1-19 [Conf ] John E. Dobson Information and Denial of Service. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:21-46 [Conf ] Edgar H. Sibley , James Bret Michael , Richard L. Wexelblat Use of an Experimental Policy Workbench: Description and Preliminary Results. [Citation Graph (1, 0)][DBLP ] DBSec, 1991, pp:47-76 [Conf ] Philip Morris , John A. McDermid The Structure of Permissions: A Normative Framework for Access Rights. [Citation Graph (1, 0)][DBLP ] DBSec, 1991, pp:77-97 [Conf ] Hans Hermann Brüggemann Rights in an Object-Oriented Environment. [Citation Graph (1, 0)][DBLP ] DBSec, 1991, pp:99-115 [Conf ] Gottfried Luef , Günther Pernul Supporting Range Queries in Multilevel-Secure Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:117-130 [Conf ] Matthew Morgenstern , Teresa F. Lunt , Bhavani M. Thuraisingham , David L. Spooner Security Issues in Federated Database Systems: Panel Contributions. [Citation Graph (2, 0)][DBLP ] DBSec, 1991, pp:131-148 [Conf ] Catherine D. McCollum , LouAnna Notargiacomo Distributed Concurrency Control with Optional Data Replication. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:149-172 [Conf ] Oliver Costich Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture. [Citation Graph (3, 0)][DBLP ] DBSec, 1991, pp:173-189 [Conf ] Paul Ammann , Sushil Jajodia A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. [Citation Graph (3, 0)][DBLP ] DBSec, 1991, pp:191-202 [Conf ] Sushil Jajodia , Ravi Mukkamala Effects of SeaView Decomposition of Multilevel Relations on Database Performance. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:203-225 [Conf ] Frédéric Cuppens , Kioumars Yazdanian Logic Hints and Security in Relational Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:227-238 [Conf ] Simon R. Wiseman Abstract and Concrete Models for Secure Database Applications. [Citation Graph (1, 0)][DBLP ] DBSec, 1991, pp:239-273 [Conf ] T. C. Ting , Steven A. Demurjian , M.-Y. Hu Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:275-296 [Conf ] Ravi S. Sandhu , Roshan K. Thomas , Sushil Jajodia Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1991, pp:297-314 [Conf ] Frédéric Cuppens A Modal Logic Framework to Solve Aggregation Problems. [Citation Graph (2, 0)][DBLP ] DBSec, 1991, pp:315-332 [Conf ] Bhavani M. Thuraisingham The Use of Conceptual Structures for Handling the Inference Problem. [Citation Graph (2, 0)][DBLP ] DBSec, 1991, pp:333-362 [Conf ] Thomas D. Garvey , Teresa F. Lunt Cover Stories for Database Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:363-380 [Conf ] Teresa F. Lunt Current Issues in Statistical Database Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:381-385 [Conf ] Catherine Meadows Discussion Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:387-397 [Conf ]