The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1994 (conf/dbsec/1994)

  1. A. R. Bakker
    Special Care Needed for the Heart of Medical Information Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:3-10 [Conf]
  2. Klaus R. Dittrich, Dirk Jonscher
    Current Trends in Database Technology and Their Impact on Security Concepts. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:11-33 [Conf]
  3. Matunda Nyanchama, Sylvia L. Osborn
    Access Rights Administration in Role-Based Security Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:37-56 [Conf]
  4. Eduardo B. Fernández, Jie Wu, Minjie H. Fernandez
    User Group Structures in Object-Oriented Database Authorization. [Citation Graph (2, 0)][DBLP]
    DBSec, 1994, pp:57-76 [Conf]
  5. M.-Y. Hu, Steven A. Demurjian, T. C. Ting
    Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:77-94 [Conf]
  6. Oliver Costich, Myong H. Kang, Judith N. Froscher
    The SINTRA Data Model: Structure and Operations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:97-110 [Conf]
  7. John P. McDermott
    The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:111-122 [Conf]
  8. James P. O'Connor
    Trusted RUBIX: A Multilevel Secure Client-Server DBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:123-136 [Conf]
  9. John Hale, Jody Threet, Sujeet Shenoi
    A Practical Formalism for Imprecise Inference Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:139-156 [Conf]
  10. Donald G. Marks, Leonard J. Binns, Bhavani M. Thuraisingham
    Hypersemantic Data Modeling for Inference Analysis. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:157-180 [Conf]
  11. Martin S. Olivier
    A Multilevel Secure Federated Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:183-198 [Conf]
  12. Elisa Bertino, Fabio Origgi, Pierangela Samarati
    A new Authorization Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:199-222 [Conf]
  13. Reind P. van de Riet, Jack Beukering
    The Integration of Security and Integrity Constraints in MOKUM. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:223-244 [Conf]
  14. Simon R. Wiseman
    Field Level Classification and SQL. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:247-258 [Conf]
  15. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:259-274 [Conf]
  16. Laurence Cholvy, Frédéric Cuppens
    Providing Consistent Views in a Polyinstantiated Database. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:277-296 [Conf]
  17. Adrian Spalka
    Secure Logic Databases Allowed to Reveal Indefinite Information on Secrets. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:297-316 [Conf]
  18. Arnon Rosenthal, James Williams, William R. Herndon, Bhavani M. Thuraisingham
    A Fine-grained Access Control Model for Object-Oriented DBMSs. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:319-334 [Conf]
  19. Todd Gross
    Creating Abstract Discretation Modification Policies with Reconfigurable Data Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:335-351 [Conf]
  20. George Pangalos
    Security Guidelines for Database Systems Development. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:353-370 [Conf]
  21. Marvin Schaefer, Sandra Wade
    Trusted ONTOS Prototype: Preliminary Considerations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:373- [Conf]
  22. Günther Pernul
    Security Object Modelling for Level-Based Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:374- [Conf]
  23. Joachim Biskup, Christian Eckert
    Enforcement of State Dependent Security Specifications. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:375- [Conf]
  24. Marvin Schaefer
    A Contemporary Survey of Discretion Access Control Policy Assurance in Commercial Trusted Relational DBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:376- [Conf]
  25. Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer
    Perspectives on Database Security - Panel Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:377-390 [Conf]
  26. Matthew Morgenstern
    Summary of Conference Discussions. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:393-403 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002