The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1992 (conf/dbsec/1992)

  1. Jeffrey G. Kaplan
    Protecting Sensitive Medical Information. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:1-14 [Conf]
  2. Roshan K. Thomas, Ravi S. Sandhu
    Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:15-34 [Conf]
  3. Kenneth Smith, Marianne Winslett
    Multilevel Secure Rules: Integrating the Multilevel Secure and Active Data Models. [Citation Graph (3, 0)][DBLP]
    DBSec, 1992, pp:35-54 [Conf]
  4. Peter J. Sell
    The SPEAR Data Design Method. [Citation Graph (1, 0)][DBLP]
    DBSec, 1992, pp:55-72 [Conf]
  5. Simon R. Wiseman
    Using SWORD for the Military Aircraft Command Example Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:73-90 [Conf]
  6. Dirk Jonscher
    Extending Access Control with Duties - Realized by Active Mechanisms. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:91-112 [Conf]
  7. Philip Morris, John A. McDermid
    Formalizing and Validating Complex Security Requirements. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:113-124 [Conf]
  8. Gerhard Steinke, Matthias Jarke
    Support for Security Modeling in Information Systems Design. [Citation Graph (1, 0)][DBLP]
    DBSec, 1992, pp:125-142 [Conf]
  9. Catherine D. McCollum
    Panel Discussion: Security for Distributed Database Management Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:143-148 [Conf]
  10. Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel
    Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. [Citation Graph (2, 0)][DBLP]
    DBSec, 1992, pp:149-168 [Conf]
  11. Leonard J. Binns
    Inference and Cover Stories. [Citation Graph (1, 0)][DBLP]
    DBSec, 1992, pp:169-178 [Conf]
  12. Thomas H. Hinke, Harry S. Delugach
    Aerie: An Inference Modeling and Detection Approach for Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1992, pp:179-194 [Conf]
  13. Leonard J. Binns
    Inference Through Secondary Path Analysis. [Citation Graph (2, 0)][DBLP]
    DBSec, 1992, pp:195-210 [Conf]
  14. George T. Duncan, Sumitra Mukherjee
    Disclosure Limitation using Autocorrelated Noise. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:211-224 [Conf]
  15. Iwen E. Kang, Thomas F. Keefe
    Recovery Management for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:225-248 [Conf]
  16. Oliver Costich, Sushil Jajodia
    Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. [Citation Graph (1, 0)][DBLP]
    DBSec, 1992, pp:249-266 [Conf]
  17. John P. McDermott, Sushil Jajodia
    Orange Locking: Channel-Free Database Concurrency Control Via Locking. [Citation Graph (1, 0)][DBLP]
    DBSec, 1992, pp:267-284 [Conf]
  18. Myong H. Kang, Oliver Costich, Judith N. Froscher
    A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:285-300 [Conf]
  19. Xiaolei Qian, Teresa F. Lunt
    Tuple-level vs Element-level Classification. [Citation Graph (4, 0)][DBLP]
    DBSec, 1992, pp:301-316 [Conf]
  20. Tsau Young Lin
    Inference Secure Multilevel Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:317-332 [Conf]
  21. M.-Y. Hu, Steven A. Demurjian, T. C. Ting
    User-Role Based Security Profiles for an Object-Oriented Design Model. [Citation Graph (2, 0)][DBLP]
    DBSec, 1992, pp:333-348 [Conf]
  22. Jarrellann Filsinger
    Integrity and the Audit of Trusted Database Management Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:349-366 [Conf]
  23. James Bret Michael, Edgar H. Sibley, Richard F. Baum, Fu Li
    On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation. [Citation Graph (1, 0)][DBLP]
    DBSec, 1992, pp:367-386 [Conf]
  24. Teresa F. Lunt
    Workshop Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:387-396 [Conf]
  25. Carl E. Landwehr
    IFIP WG 11.3 Database Security: Research Questions of Current Significance. [Citation Graph (0, 0)][DBLP]
    DBSec, 1992, pp:397-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002