|
Conferences in DBLP
- T. C. Ting
How Secure is Secure: Some Thoughts on Security Metrics. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:3-7 [Conf]
- John E. Dobson, Mike Martin
Messages, Communication, Information Security: Protecting the User from the Data. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:8-23 [Conf]
- Martin S. Olivier
Self-protecting Objects in a Secure Federated Database. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:27-42 [Conf]
- Dirk Jonscher, Klaus R. Dittrich
Argos - A Configurable Access Control System for Interoperable Environments. [Citation Graph (1, 0)][DBLP] DBSec, 1995, pp:43-60 [Conf]
- Ira S. Moskowitz, Myong H. Kang
The Modulated-Input Modulated-Output Model. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:61-75 [Conf]
- Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu
URBS Enforcement Mechanisms for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:79-94 [Conf]
- Eduardo B. Fernández, Robert B. France, D. Wei
A Formal Specification of an Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:95-110 [Conf]
- Marvin Schaefer, P. Martel, T. Kanawati, V. Lyons
Multilevel Data Model for the Trusted ONTOS Prototype. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:111-126 [Conf]
- Matunda Nyanchama, Sylvia L. Osborn
Modeling Mandatory Access Control in Role-Based Security Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:129-144 [Conf]
- Frédéric Cuppens, Alban Gabillon
Modelling a Multilevel Database with Temporal Downgrading Functionalities. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:145-164 [Conf]
- Xiaolei Qian, Teresa F. Lunt
Towards a MAC Policy Framework. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:165-180 [Conf]
- Shankar Pal
A Locking Protocol for MLS Databases Providing Support For Long Transactions. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:183-198 [Conf]
- Sang Hyuk Son, Rasikan David, Bhavani M. Thuraisingham
An Adaptive Policy for Improved Timeliness in Secure Database Systems. [Citation Graph (1, 0)][DBLP] DBSec, 1995, pp:199-214 [Conf]
- Ravi Mukkamala, Sang Hyuk Son
A Secure Concurrency Control Protocol for Real-Time Databases. [Citation Graph (1, 0)][DBLP] DBSec, 1995, pp:215-230 [Conf]
- Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:231-247 [Conf]
- Marvin Schaefer, Gary W. Smith
Assured Discretionary Access Control for Trusted RDBMS. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:251-266 [Conf]
- Ralph Holbein, Stephanie Teufel, Kurt Bauknecht
A Formal Security Design Approach for Information Exchange in Organisations. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:267-285 [Conf]
- Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting
Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:289-298 [Conf]
- Rae K. Burns
Inference Analysis During Multilevel Database Design. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:301-316 [Conf]
- Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi
A Tool for Inference Detection and Knowledge Discovery in Databases. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:317-332 [Conf]
- Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf
ILIAD: An Integrated Laboratoty For Inference Analysis and Detection. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:333-348 [Conf]
- Marvin Schaefer, Ronda R. Henning, Roger L. Miller, Thomas J. Parenty, Jesse C. Worthington
Customer Requirements for Security in Relational Database Management. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:351-361 [Conf]
- John P. McDermott, David M. Goldschlag
Storage Jamming. [Citation Graph (1, 0)][DBLP] DBSec, 1995, pp:365-381 [Conf]
- John E. Dobson
Report of Discussion Sessions Following Presentations. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:382-387 [Conf]
- Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani M. Thuraisingham
Security and Data Mining. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:391-399 [Conf]
|