The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1987 (conf/dbsec/87)

  1. Carl E. Landwehr
    Database Security: Where are We? [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:1-9 [Conf]
  2. John E. Dobson
    Security and Databases: A Personal View. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:11-21 [Conf]
  3. Frank Manola
    A Personal View of DBMS Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:23-34 [Conf]
  4. Dorothy E. Denning
    Lessons Learned from Modeling a Secure Multilevel Relational Database System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:35-43 [Conf]
  5. J. Thomas Haigh
    Modeling Datbase Security Requirements. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:45-56 [Conf]
  6. Thomas H. Hinke
    DBMS Technology vs. Threats. [Citation Graph (1, 0)][DBLP]
    DBSec, 1987, pp:57-87 [Conf]
  7. Catherine Meadows, Sushil Jajodia
    Integrity Versus Security in Multi-Level Secure Databases. [Citation Graph (7, 0)][DBLP]
    DBSec, 1987, pp:89-101 [Conf]
  8. Maria Grazia Fugini
    Secure Database Development Methodologies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:103-129 [Conf]
  9. Ronda R. Henning
    The Allocation of Database Management System Security Responsibilities. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:131-148 [Conf]
  10. David L. Spooner
    Relationships between database System and Operating System Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:149-158 [Conf]
  11. Norman S. Matloff
    Inference Control Via Query Restriction Vs. Data Modification: A Perspective. [Citation Graph (2, 0)][DBLP]
    DBSec, 1987, pp:159-166 [Conf]
  12. Lawrence H. Cox
    Modelling and Controlling User Inference. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:167-171 [Conf]
  13. Joachim Biskup
    Privacy Respecting Permissions and Rights. [Citation Graph (1, 0)][DBLP]
    DBSec, 1987, pp:173-185 [Conf]
  14. T. C. Ting
    A User-Role Based Data Security Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:187-208 [Conf]
  15. Frederick H. Lochovsky, Carson C. Woo
    Role-Based Security in Data Base Management Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1987, pp:209-222 [Conf]
  16. David A. Bonyun
    Logging and Accountability in Database Management Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:223-227 [Conf]
  17. Richard A. Kemmerer
    Formal Specification and Verification Techniques for Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:229-240 [Conf]
  18. Rae K. Burns
    Operational Assurance for a Trusted DBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:241-251 [Conf]
  19. Glenn H. MacEwen
    Effects of Distributed System Technology on Database Security: A Survey. [Citation Graph (1, 0)][DBLP]
    DBSec, 1987, pp:253-261 [Conf]
  20. Michael W. Hale
    Status of Trusted DBMS Implementations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:263-268 [Conf]
  21. David K. Hsiao
    Database Security Course Module. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:269-301 [Conf]
  22. David K. Hsiao
    Discussion Notes and Revised Question List. [Citation Graph (0, 0)][DBLP]
    DBSec, 1987, pp:303-330 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002