|
Conferences in DBLP
- Jeffrey G. Kaplan
Protecting Sensitive Medical Information. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:1-14 [Conf]
- Roshan K. Thomas, Ravi S. Sandhu
Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:15-34 [Conf]
- Kenneth Smith, Marianne Winslett
Multilevel Secure Rules: Integrating the Multilevel Secure and Active Data Models. [Citation Graph (3, 0)][DBLP] DBSec, 1992, pp:35-54 [Conf]
- Peter J. Sell
The SPEAR Data Design Method. [Citation Graph (1, 0)][DBLP] DBSec, 1992, pp:55-72 [Conf]
- Simon R. Wiseman
Using SWORD for the Military Aircraft Command Example Database. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:73-90 [Conf]
- Dirk Jonscher
Extending Access Control with Duties - Realized by Active Mechanisms. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:91-112 [Conf]
- Philip Morris, John A. McDermid
Formalizing and Validating Complex Security Requirements. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:113-124 [Conf]
- Gerhard Steinke, Matthias Jarke
Support for Security Modeling in Information Systems Design. [Citation Graph (1, 0)][DBLP] DBSec, 1992, pp:125-142 [Conf]
- Catherine D. McCollum
Panel Discussion: Security for Distributed Database Management Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:143-148 [Conf]
- Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel
Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. [Citation Graph (2, 0)][DBLP] DBSec, 1992, pp:149-168 [Conf]
- Leonard J. Binns
Inference and Cover Stories. [Citation Graph (1, 0)][DBLP] DBSec, 1992, pp:169-178 [Conf]
- Thomas H. Hinke, Harry S. Delugach
Aerie: An Inference Modeling and Detection Approach for Databases. [Citation Graph (3, 0)][DBLP] DBSec, 1992, pp:179-194 [Conf]
- Leonard J. Binns
Inference Through Secondary Path Analysis. [Citation Graph (2, 0)][DBLP] DBSec, 1992, pp:195-210 [Conf]
- George T. Duncan, Sumitra Mukherjee
Disclosure Limitation using Autocorrelated Noise. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:211-224 [Conf]
- Iwen E. Kang, Thomas F. Keefe
Recovery Management for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:225-248 [Conf]
- Oliver Costich, Sushil Jajodia
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. [Citation Graph (1, 0)][DBLP] DBSec, 1992, pp:249-266 [Conf]
- John P. McDermott, Sushil Jajodia
Orange Locking: Channel-Free Database Concurrency Control Via Locking. [Citation Graph (1, 0)][DBLP] DBSec, 1992, pp:267-284 [Conf]
- Myong H. Kang, Oliver Costich, Judith N. Froscher
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:285-300 [Conf]
- Xiaolei Qian, Teresa F. Lunt
Tuple-level vs Element-level Classification. [Citation Graph (4, 0)][DBLP] DBSec, 1992, pp:301-316 [Conf]
- Tsau Young Lin
Inference Secure Multilevel Databases. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:317-332 [Conf]
- M.-Y. Hu, Steven A. Demurjian, T. C. Ting
User-Role Based Security Profiles for an Object-Oriented Design Model. [Citation Graph (2, 0)][DBLP] DBSec, 1992, pp:333-348 [Conf]
- Jarrellann Filsinger
Integrity and the Audit of Trusted Database Management Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:349-366 [Conf]
- James Bret Michael, Edgar H. Sibley, Richard F. Baum, Fu Li
On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation. [Citation Graph (1, 0)][DBLP] DBSec, 1992, pp:367-386 [Conf]
- Teresa F. Lunt
Workshop Summary. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:387-396 [Conf]
- Carl E. Landwehr
IFIP WG 11.3 Database Security: Research Questions of Current Significance. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:397-0 [Conf]
|