Conferences in DBLP
A. R. Bakker Special Care Needed for the Heart of Medical Information Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:3-10 [Conf ] Klaus R. Dittrich , Dirk Jonscher Current Trends in Database Technology and Their Impact on Security Concepts. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:11-33 [Conf ] Matunda Nyanchama , Sylvia L. Osborn Access Rights Administration in Role-Based Security Systems. [Citation Graph (1, 0)][DBLP ] DBSec, 1994, pp:37-56 [Conf ] Eduardo B. Fernández , Jie Wu , Minjie H. Fernandez User Group Structures in Object-Oriented Database Authorization. [Citation Graph (2, 0)][DBLP ] DBSec, 1994, pp:57-76 [Conf ] M.-Y. Hu , Steven A. Demurjian , T. C. Ting Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:77-94 [Conf ] Oliver Costich , Myong H. Kang , Judith N. Froscher The SINTRA Data Model: Structure and Operations. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:97-110 [Conf ] John P. McDermott The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:111-122 [Conf ] James P. O'Connor Trusted RUBIX: A Multilevel Secure Client-Server DBMS. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:123-136 [Conf ] John Hale , Jody Threet , Sujeet Shenoi A Practical Formalism for Imprecise Inference Control. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:139-156 [Conf ] Donald G. Marks , Leonard J. Binns , Bhavani M. Thuraisingham Hypersemantic Data Modeling for Inference Analysis. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:157-180 [Conf ] Martin S. Olivier A Multilevel Secure Federated Database. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:183-198 [Conf ] Elisa Bertino , Fabio Origgi , Pierangela Samarati A new Authorization Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1994, pp:199-222 [Conf ] Reind P. van de Riet , Jack Beukering The Integration of Security and Integrity Constraints in MOKUM. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:223-244 [Conf ] Simon R. Wiseman Field Level Classification and SQL. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:247-258 [Conf ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. [Citation Graph (1, 0)][DBLP ] DBSec, 1994, pp:259-274 [Conf ] Laurence Cholvy , Frédéric Cuppens Providing Consistent Views in a Polyinstantiated Database. [Citation Graph (1, 0)][DBLP ] DBSec, 1994, pp:277-296 [Conf ] Adrian Spalka Secure Logic Databases Allowed to Reveal Indefinite Information on Secrets. [Citation Graph (1, 0)][DBLP ] DBSec, 1994, pp:297-316 [Conf ] Arnon Rosenthal , James Williams , William R. Herndon , Bhavani M. Thuraisingham A Fine-grained Access Control Model for Object-Oriented DBMSs. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:319-334 [Conf ] Todd Gross Creating Abstract Discretation Modification Policies with Reconfigurable Data Objects. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:335-351 [Conf ] George Pangalos Security Guidelines for Database Systems Development. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:353-370 [Conf ] Marvin Schaefer , Sandra Wade Trusted ONTOS Prototype: Preliminary Considerations. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:373- [Conf ] Günther Pernul Security Object Modelling for Level-Based Policies. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:374- [Conf ] Joachim Biskup , Christian Eckert Enforcement of State Dependent Security Specifications. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:375- [Conf ] Marvin Schaefer A Contemporary Survey of Discretion Access Control Policy Assurance in Commercial Trusted Relational DBMS. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:376- [Conf ] Matthew Morgenstern , Joachim Biskup , Klaus R. Dittrich , Carl E. Landwehr , Marvin Schaefer Perspectives on Database Security - Panel Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:377-390 [Conf ] Matthew Morgenstern Summary of Conference Discussions. [Citation Graph (0, 0)][DBLP ] DBSec, 1994, pp:393-403 [Conf ]