|
Conferences in DBLP
- Lawrence H. Cox
Invited Talk - Inference Control Problems in Statistical Database Query Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:1-13 [Conf]
- Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
Attribute Mutability in Usage Control. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:15-29 [Conf]
- Vijayalakshmi Atluri, Qi Guo
STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:31-47 [Conf]
- Andreas Schaad
An Extended Analysis of Delegating Obligations. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:49-64 [Conf]
- Indrakshi Ray, Tai Xin
Implementing Real-Time Update of Access Control Policies. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:65-80 [Conf]
- Yingjiu Li, Vipin Swarup, Sushil Jajodia
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:81-94 [Conf]
- Hakan Hacigümüs, Sharad Mehrotra
Performance-Conscious Key Management in Encrypted Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:95-109 [Conf]
- Yanjun Zuo, Brajendra Panda
Damage Discovery in Distributed Database Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:111-123 [Conf]
- Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce
Information Flow Analysis for File Systems and Databases Using Labels. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:125-141 [Conf]
- Joachim Biskup, Torben Weibert
Refusal in Incomplete Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:143-157 [Conf]
- Aybar C. Acar, Amihai Motro
Why Is this User Asking so Many Questions? Explaining Sequences of Queries. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:159-176 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati
Invited Talk - Towards Semantics-Aware Access Control. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:177-188 [Conf]
- Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting
RBAC/MAC Security Analysis and Design for UML. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:189-203 [Conf]
- Inja Youn, Duminda Wijesekera
Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:205-218 [Conf]
- Ravi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley
Policy-based Security Management for Enterprise Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:219-233 [Conf]
- Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul
A Pattern System for Access Control. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:235-249 [Conf]
- Mei Ge, Sylvia L. Osborn
A Design for Parameterized Roles. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:251-264 [Conf]
- Ladislav Huraj, Helmut Reiser
Efficient Verification of Delegation in Distributed Group Membership Management. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:265-280 [Conf]
- Steve Barker
Web Resource Usage Control in RSCLP. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:281-294 [Conf]
- Indrajit Ray, Tomas Hajek
Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:295-309 [Conf]
- Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen
On The Damage and Compensation of Privacy Leakage. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:311-324 [Conf]
- Emmanuel D. Pontikakis, Achilleas A. Tsitsonis, Vassilios S. Verykios
An Experimental Study of Distortion-Based Techniques for Association Rule Hiding. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:325-339 [Conf]
- Justin Z. Zhan, LiWu Chang, Stan Matwin
Privacy-Preserving Multi-Party Decision Tree Induction. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:341-355 [Conf]
- Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart
Configuring Storage Area Networks for Mandatory Security. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:357-370 [Conf]
- Joon S. Park, Abhishek Jain
A Framework for Trusted Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:371-384 [Conf]
|