The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1993 (conf/dbsec/1993)

  1. Joachim Biskup, Christian Eckert
    About the Enforcement of State Dependent Specifications. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:3-17 [Conf]
  2. Dirk Jonscher, Jonathan D. Moffett, Klaus R. Dittrich
    Complex Subjects, or: The Striving for Complexity is Ruling our World. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:19-37 [Conf]
  3. Peter J. Sell, Bhavani M. Thuraisingham
    Applying OMT for Designing Multilevel Database Applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:41-64 [Conf]
  4. William R. Herndon
    An Interpretation of Clark-Wilson for Object-Oriented DBMSs. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:65-85 [Conf]
  5. Norbik Bashah Idris, W. A. Gray, M. A. Qutaishat
    Integration of Secrecy Features in a Federated Database Environment. [Citation Graph (2, 0)][DBLP]
    DBSec, 1993, pp:89-108 [Conf]
  6. Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein
    Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:109-121 [Conf]
  7. Paul Ammann, Sushil Jajodia
    Planar Lattice Security Structures for Multilevel Replicated Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:125-134 [Conf]
  8. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:135-158 [Conf]
  9. Arnon Rosenthal, William R. Herndon
    Granularity of Data Protection for MLS Applications and DBMSs. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:161-180 [Conf]
  10. Simon R. Wiseman
    Security Properties of the SWORD Secure DBMS design. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:181-196 [Conf]
  11. Ravi Mukkamala, Sushil Jajodia
    A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:199-214 [Conf]
  12. John P. McDermott, Ravi Mukkamala
    Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:215-234 [Conf]
  13. LouAnna Notargiacomo, Barbara T. Blaustein, Catherine D. McCollum
    A Model of Integrity Separation of Duty for a Trusted DBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:237-256 [Conf]
  14. Ravi S. Sandhu
    On Five Definitions of Data Integrity. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:257-267 [Conf]
  15. Jan Filsinger, Bret Michaels
    Panel on Privacy Issues in the Design of Healthcare Information Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:271- [Conf]
  16. Thomas H. Hinke, Harry S. Delugach, Asha Chandrasekhar
    Layered Knowledge Chunks for Database Inference. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:275-295 [Conf]
  17. Leonard J. Binns
    Implementation Considerations for Inference Detection: Intended vs. Actual Classification. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:297-306 [Conf]
  18. Roshan K. Thomas, Ravi S. Sandhu
    Towards a Unified Framework and Theory for Reasoning about Security and Correctness of Transactions in Multilevel databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:309-328 [Conf]
  19. Oliver Costich, Myong H. Kang
    Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:329-355 [Conf]
  20. Bhavani M. Thuraisingham
    Workshop Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:357-362 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002