Conferences in DBLP
John E. Dobson , John A. McDermid Security Models and Enterprise Models. [Citation Graph (1, 0)][DBLP ] DBSec, 1988, pp:1-39 [Conf ] Teresa F. Lunt Access Control Policies for Database Systems. [Citation Graph (5, 0)][DBLP ] DBSec, 1988, pp:41-52 [Conf ] Nancy R. Jensen System Security Officer Functions in the A1 Secure DBMS. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:53-62 [Conf ] D. J. Thomsen , W. T. Tsai , Bhavani M. Thuraisingham Prototyping as a Research Tool for MLS/DBMS. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:63-84 [Conf ] Tsau Young Lin A Generalized Information Flow Model and the Role of System Security Officer. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:85-103 [Conf ] Klaus R. Dittrich , Martin Härtig , Heribert Pfefferle Discretionary Access Control in Structurally Object-Oriented Database Systems. [Citation Graph (4, 0)][DBLP ] DBSec, 1988, pp:105-121 [Conf ] Joachim Biskup , Hans-Werner Graf Analysis of the Privacy Model for the Information System DORIS. [Citation Graph (3, 0)][DBLP ] DBSec, 1988, pp:123-140 [Conf ] David L. Spooner The Impact of Inheritance on Security in Object-Oriented Database Systems. [Citation Graph (3, 0)][DBLP ] DBSec, 1988, pp:141-150 [Conf ] Judith N. Froscher , Catherine Meadows Achieving a Trusted Database Management System Using Parallelism. [Citation Graph (2, 0)][DBLP ] DBSec, 1988, pp:151-160 [Conf ] Hilary H. Hosmer , Rae K. Burns Designing Multilevel Secure Distributed Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:161-165 [Conf ] Gregory S. Hoppenstand , David K. Hsiao Secure Access Control with High Access Precision: An Efficient Approach to Multilevel Security. [Citation Graph (1, 0)][DBLP ] DBSec, 1988, pp:167-176 [Conf ] Teresa F. Lunt Multilevel Database Systems: Meeting Class A1. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:177-186 [Conf ] Cristi Garvey , Nancy R. Jensen , Jackson Wilson The Advanced Secure DBMS: Making Secure DBMSs Usable. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:187-195 [Conf ] Janice I. Glasgow , Glenn H. MacEwen , Prakash Panangaden Security by Permission in Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:197-205 [Conf ] Ion Tim Ieong , T. C. Ting An Analysis of Database Security with Queries for High Order Statistical Information. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:207-223 [Conf ] Norman S. Matloff , Patrick Tendick The 'Curse of Dimensionality' in Database Security. [Citation Graph (1, 0)][DBLP ] DBSec, 1988, pp:225-232 [Conf ] Ronda R. Henning , Richard P. Simonian Security Analysis of database Schema Information. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:233-245 [Conf ] Thomas H. Hinke Database Inference Engine Design Approach. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:247-262 [Conf ] D. J. Thomsen , J. Thomas Haigh , Carl E. Landwehr Discussion Notes and Research Question List. [Citation Graph (0, 0)][DBLP ] DBSec, 1988, pp:263-280 [Conf ]