The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2004 (conf/dbsec/2004)

  1. Lawrence H. Cox
    Invited Talk - Inference Control Problems in Statistical Database Query Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:1-13 [Conf]
  2. Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
    Attribute Mutability in Usage Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:15-29 [Conf]
  3. Vijayalakshmi Atluri, Qi Guo
    STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:31-47 [Conf]
  4. Andreas Schaad
    An Extended Analysis of Delegating Obligations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:49-64 [Conf]
  5. Indrakshi Ray, Tai Xin
    Implementing Real-Time Update of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:65-80 [Conf]
  6. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:81-94 [Conf]
  7. Hakan Hacigümüs, Sharad Mehrotra
    Performance-Conscious Key Management in Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:95-109 [Conf]
  8. Yanjun Zuo, Brajendra Panda
    Damage Discovery in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:111-123 [Conf]
  9. Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce
    Information Flow Analysis for File Systems and Databases Using Labels. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:125-141 [Conf]
  10. Joachim Biskup, Torben Weibert
    Refusal in Incomplete Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:143-157 [Conf]
  11. Aybar C. Acar, Amihai Motro
    Why Is this User Asking so Many Questions? Explaining Sequences of Queries. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:159-176 [Conf]
  12. Ernesto Damiani, Sabrina De Capitani di Vimercati
    Invited Talk - Towards Semantics-Aware Access Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:177-188 [Conf]
  13. Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting
    RBAC/MAC Security Analysis and Design for UML. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:189-203 [Conf]
  14. Inja Youn, Duminda Wijesekera
    Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:205-218 [Conf]
  15. Ravi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley
    Policy-based Security Management for Enterprise Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:219-233 [Conf]
  16. Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul
    A Pattern System for Access Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:235-249 [Conf]
  17. Mei Ge, Sylvia L. Osborn
    A Design for Parameterized Roles. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:251-264 [Conf]
  18. Ladislav Huraj, Helmut Reiser
    Efficient Verification of Delegation in Distributed Group Membership Management. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:265-280 [Conf]
  19. Steve Barker
    Web Resource Usage Control in RSCLP. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:281-294 [Conf]
  20. Indrajit Ray, Tomas Hajek
    Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:295-309 [Conf]
  21. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen
    On The Damage and Compensation of Privacy Leakage. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:311-324 [Conf]
  22. Emmanuel D. Pontikakis, Achilleas A. Tsitsonis, Vassilios S. Verykios
    An Experimental Study of Distortion-Based Techniques for Association Rule Hiding. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:325-339 [Conf]
  23. Justin Z. Zhan, LiWu Chang, Stan Matwin
    Privacy-Preserving Multi-Party Decision Tree Induction. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:341-355 [Conf]
  24. Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart
    Configuring Storage Area Networks for Mandatory Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:357-370 [Conf]
  25. Joon S. Park, Abhishek Jain
    A Framework for Trusted Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:371-384 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002