Conferences in DBLP
Joachim Biskup , Christian Eckert About the Enforcement of State Dependent Specifications. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:3-17 [Conf ] Dirk Jonscher , Jonathan D. Moffett , Klaus R. Dittrich Complex Subjects, or: The Striving for Complexity is Ruling our World. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:19-37 [Conf ] Peter J. Sell , Bhavani M. Thuraisingham Applying OMT for Designing Multilevel Database Applications. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:41-64 [Conf ] William R. Herndon An Interpretation of Clark-Wilson for Object-Oriented DBMSs. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:65-85 [Conf ] Norbik Bashah Idris , W. A. Gray , M. A. Qutaishat Integration of Secrecy Features in a Federated Database Environment. [Citation Graph (2, 0)][DBLP ] DBSec, 1993, pp:89-108 [Conf ] Sushil Jajodia , Catherine D. McCollum , Barbara T. Blaustein Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:109-121 [Conf ] Paul Ammann , Sushil Jajodia Planar Lattice Security Structures for Multilevel Replicated Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:125-134 [Conf ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:135-158 [Conf ] Arnon Rosenthal , William R. Herndon Granularity of Data Protection for MLS Applications and DBMSs. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:161-180 [Conf ] Simon R. Wiseman Security Properties of the SWORD Secure DBMS design. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:181-196 [Conf ] Ravi Mukkamala , Sushil Jajodia A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:199-214 [Conf ] John P. McDermott , Ravi Mukkamala Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:215-234 [Conf ] LouAnna Notargiacomo , Barbara T. Blaustein , Catherine D. McCollum A Model of Integrity Separation of Duty for a Trusted DBMS. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:237-256 [Conf ] Ravi S. Sandhu On Five Definitions of Data Integrity. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:257-267 [Conf ] Jan Filsinger , Bret Michaels Panel on Privacy Issues in the Design of Healthcare Information Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:271- [Conf ] Thomas H. Hinke , Harry S. Delugach , Asha Chandrasekhar Layered Knowledge Chunks for Database Inference. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:275-295 [Conf ] Leonard J. Binns Implementation Considerations for Inference Detection: Intended vs. Actual Classification. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:297-306 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:309-328 [Conf ] Oliver Costich , Myong H. Kang Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:329-355 [Conf ] Bhavani M. Thuraisingham Workshop Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:357-362 [Conf ]