The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1988 (conf/dbsec/88)

  1. John E. Dobson, John A. McDermid
    Security Models and Enterprise Models. [Citation Graph (1, 0)][DBLP]
    DBSec, 1988, pp:1-39 [Conf]
  2. Teresa F. Lunt
    Access Control Policies for Database Systems. [Citation Graph (5, 0)][DBLP]
    DBSec, 1988, pp:41-52 [Conf]
  3. Nancy R. Jensen
    System Security Officer Functions in the A1 Secure DBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:53-62 [Conf]
  4. D. J. Thomsen, W. T. Tsai, Bhavani M. Thuraisingham
    Prototyping as a Research Tool for MLS/DBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:63-84 [Conf]
  5. Tsau Young Lin
    A Generalized Information Flow Model and the Role of System Security Officer. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:85-103 [Conf]
  6. Klaus R. Dittrich, Martin Härtig, Heribert Pfefferle
    Discretionary Access Control in Structurally Object-Oriented Database Systems. [Citation Graph (4, 0)][DBLP]
    DBSec, 1988, pp:105-121 [Conf]
  7. Joachim Biskup, Hans-Werner Graf
    Analysis of the Privacy Model for the Information System DORIS. [Citation Graph (3, 0)][DBLP]
    DBSec, 1988, pp:123-140 [Conf]
  8. David L. Spooner
    The Impact of Inheritance on Security in Object-Oriented Database Systems. [Citation Graph (3, 0)][DBLP]
    DBSec, 1988, pp:141-150 [Conf]
  9. Judith N. Froscher, Catherine Meadows
    Achieving a Trusted Database Management System Using Parallelism. [Citation Graph (2, 0)][DBLP]
    DBSec, 1988, pp:151-160 [Conf]
  10. Hilary H. Hosmer, Rae K. Burns
    Designing Multilevel Secure Distributed Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:161-165 [Conf]
  11. Gregory S. Hoppenstand, David K. Hsiao
    Secure Access Control with High Access Precision: An Efficient Approach to Multilevel Security. [Citation Graph (1, 0)][DBLP]
    DBSec, 1988, pp:167-176 [Conf]
  12. Teresa F. Lunt
    Multilevel Database Systems: Meeting Class A1. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:177-186 [Conf]
  13. Cristi Garvey, Nancy R. Jensen, Jackson Wilson
    The Advanced Secure DBMS: Making Secure DBMSs Usable. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:187-195 [Conf]
  14. Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden
    Security by Permission in Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:197-205 [Conf]
  15. Ion Tim Ieong, T. C. Ting
    An Analysis of Database Security with Queries for High Order Statistical Information. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:207-223 [Conf]
  16. Norman S. Matloff, Patrick Tendick
    The 'Curse of Dimensionality' in Database Security. [Citation Graph (1, 0)][DBLP]
    DBSec, 1988, pp:225-232 [Conf]
  17. Ronda R. Henning, Richard P. Simonian
    Security Analysis of database Schema Information. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:233-245 [Conf]
  18. Thomas H. Hinke
    Database Inference Engine Design Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:247-262 [Conf]
  19. D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr
    Discussion Notes and Research Question List. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:263-280 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002