The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1995 (conf/dbsec/1995)

  1. T. C. Ting
    How Secure is Secure: Some Thoughts on Security Metrics. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:3-7 [Conf]
  2. John E. Dobson, Mike Martin
    Messages, Communication, Information Security: Protecting the User from the Data. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:8-23 [Conf]
  3. Martin S. Olivier
    Self-protecting Objects in a Secure Federated Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:27-42 [Conf]
  4. Dirk Jonscher, Klaus R. Dittrich
    Argos - A Configurable Access Control System for Interoperable Environments. [Citation Graph (1, 0)][DBLP]
    DBSec, 1995, pp:43-60 [Conf]
  5. Ira S. Moskowitz, Myong H. Kang
    The Modulated-Input Modulated-Output Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:61-75 [Conf]
  6. Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu
    URBS Enforcement Mechanisms for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:79-94 [Conf]
  7. Eduardo B. Fernández, Robert B. France, D. Wei
    A Formal Specification of an Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:95-110 [Conf]
  8. Marvin Schaefer, P. Martel, T. Kanawati, V. Lyons
    Multilevel Data Model for the Trusted ONTOS Prototype. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:111-126 [Conf]
  9. Matunda Nyanchama, Sylvia L. Osborn
    Modeling Mandatory Access Control in Role-Based Security Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:129-144 [Conf]
  10. Frédéric Cuppens, Alban Gabillon
    Modelling a Multilevel Database with Temporal Downgrading Functionalities. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:145-164 [Conf]
  11. Xiaolei Qian, Teresa F. Lunt
    Towards a MAC Policy Framework. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:165-180 [Conf]
  12. Shankar Pal
    A Locking Protocol for MLS Databases Providing Support For Long Transactions. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:183-198 [Conf]
  13. Sang Hyuk Son, Rasikan David, Bhavani M. Thuraisingham
    An Adaptive Policy for Improved Timeliness in Secure Database Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1995, pp:199-214 [Conf]
  14. Ravi Mukkamala, Sang Hyuk Son
    A Secure Concurrency Control Protocol for Real-Time Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1995, pp:215-230 [Conf]
  15. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:231-247 [Conf]
  16. Marvin Schaefer, Gary W. Smith
    Assured Discretionary Access Control for Trusted RDBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:251-266 [Conf]
  17. Ralph Holbein, Stephanie Teufel, Kurt Bauknecht
    A Formal Security Design Approach for Information Exchange in Organisations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:267-285 [Conf]
  18. Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting
    Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:289-298 [Conf]
  19. Rae K. Burns
    Inference Analysis During Multilevel Database Design. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:301-316 [Conf]
  20. Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi
    A Tool for Inference Detection and Knowledge Discovery in Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:317-332 [Conf]
  21. Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf
    ILIAD: An Integrated Laboratoty For Inference Analysis and Detection. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:333-348 [Conf]
  22. Marvin Schaefer, Ronda R. Henning, Roger L. Miller, Thomas J. Parenty, Jesse C. Worthington
    Customer Requirements for Security in Relational Database Management. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:351-361 [Conf]
  23. John P. McDermott, David M. Goldschlag
    Storage Jamming. [Citation Graph (1, 0)][DBLP]
    DBSec, 1995, pp:365-381 [Conf]
  24. John E. Dobson
    Report of Discussion Sessions Following Presentations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:382-387 [Conf]
  25. Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani M. Thuraisingham
    Security and Data Mining. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:391-399 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002