Conferences in DBLP
Carl E. Landwehr Database Security: Where are We? [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:1-9 [Conf ] John E. Dobson Security and Databases: A Personal View. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:11-21 [Conf ] Frank Manola A Personal View of DBMS Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:23-34 [Conf ] Dorothy E. Denning Lessons Learned from Modeling a Secure Multilevel Relational Database System. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:35-43 [Conf ] J. Thomas Haigh Modeling Datbase Security Requirements. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:45-56 [Conf ] Thomas H. Hinke DBMS Technology vs. Threats. [Citation Graph (1, 0)][DBLP ] DBSec, 1987, pp:57-87 [Conf ] Catherine Meadows , Sushil Jajodia Integrity Versus Security in Multi-Level Secure Databases. [Citation Graph (7, 0)][DBLP ] DBSec, 1987, pp:89-101 [Conf ] Maria Grazia Fugini Secure Database Development Methodologies. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:103-129 [Conf ] Ronda R. Henning The Allocation of Database Management System Security Responsibilities. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:131-148 [Conf ] David L. Spooner Relationships between database System and Operating System Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:149-158 [Conf ] Norman S. Matloff Inference Control Via Query Restriction Vs. Data Modification: A Perspective. [Citation Graph (2, 0)][DBLP ] DBSec, 1987, pp:159-166 [Conf ] Lawrence H. Cox Modelling and Controlling User Inference. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:167-171 [Conf ] Joachim Biskup Privacy Respecting Permissions and Rights. [Citation Graph (1, 0)][DBLP ] DBSec, 1987, pp:173-185 [Conf ] T. C. Ting A User-Role Based Data Security Approach. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:187-208 [Conf ] Frederick H. Lochovsky , Carson C. Woo Role-Based Security in Data Base Management Systems. [Citation Graph (1, 0)][DBLP ] DBSec, 1987, pp:209-222 [Conf ] David A. Bonyun Logging and Accountability in Database Management Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:223-227 [Conf ] Richard A. Kemmerer Formal Specification and Verification Techniques for Secure Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:229-240 [Conf ] Rae K. Burns Operational Assurance for a Trusted DBMS. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:241-251 [Conf ] Glenn H. MacEwen Effects of Distributed System Technology on Database Security: A Survey. [Citation Graph (1, 0)][DBLP ] DBSec, 1987, pp:253-261 [Conf ] Michael W. Hale Status of Trusted DBMS Implementations. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:263-268 [Conf ] David K. Hsiao Database Security Course Module. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:269-301 [Conf ] David K. Hsiao Discussion Notes and Revised Question List. [Citation Graph (0, 0)][DBLP ] DBSec, 1987, pp:303-330 [Conf ]