The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1989 (conf/dbsec/89)

  1. T. C. Ting
    Application Information Security Semantics: A Case of Mental Health Delivery. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:1-12 [Conf]
  2. Joachim Biskup
    Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:13-23 [Conf]
  3. John E. Dobson
    Conversation Structures as a Means of Specifying Security Policy. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:25-39 [Conf]
  4. John A. McDermid, Ernest S. Hocking
    Security Policies for Integrated Project Support Environments. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:41-74 [Conf]
  5. Tsau Young Lin, Larry Kerschberg, Robert P. Trueblood
    Security Algebras and Formal Models: Using Petri Net Theory. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:75-96 [Conf]
  6. Thomas H. Hinke
    DBMS Trusted Computing Base Taxonomy. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:97-108 [Conf]
  7. Richard D. Graubart
    Comparing DBMS and Operating System Security Requirements - The Need for a Separate DBMS Security Criteria. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:109-114 [Conf]
  8. Gary W. Smith
    Solving Multilevel Database Security Problems: Technology Is Not Enough. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:115-125 [Conf]
  9. Catherine Meadows
    Constructing Containers Using a Multilevel Relational Data Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:127-141 [Conf]
  10. Ravi S. Sandhu
    Mandatory Controls for Database Integrity. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:143-150 [Conf]
  11. Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu
    A Layered TCB Implementation versus the Hinke-Schaefer Approach. [Citation Graph (1, 0)][DBLP]
    DBSec, 1989, pp:151-165 [Conf]
  12. Richard D. Graubart
    A Comparison of Three Secure DBMS Architectures. [Citation Graph (1, 0)][DBLP]
    DBSec, 1989, pp:167-190 [Conf]
  13. John R. Campbell
    An Interim Report on the Development of Secure Database Prototypes at the National Computer Security Center. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:191-197 [Conf]
  14. Teresa F. Lunt
    Multilevel Security for Object-Oriented Database Systems. [Citation Graph (3, 0)][DBLP]
    DBSec, 1989, pp:199-209 [Conf]
  15. Thomas F. Keefe, Wei-Tek Tsai
    Prototyping the SODA Model. [Citation Graph (1, 0)][DBLP]
    DBSec, 1989, pp:211-235 [Conf]
  16. David A. Bonyun
    Using Exess as a Framework for Secure DBMSs. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:237-255 [Conf]
  17. María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández
    Security Policies in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1989, pp:257-268 [Conf]
  18. Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley
    Audit Trail Organization in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:269-281 [Conf]
  19. Hilary H. Hosmer
    Handling Security Violations within an Integrity Lock DBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:283-292 [Conf]
  20. Tzong-An Su, Gultekin Özsoyoglu
    Multivalued Dependency Inferences in Multilevel Relational Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:293-300 [Conf]
  21. Simon R. Wiseman
    On the Problem of Security in Data Bases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:301-310 [Conf]
  22. Leoan J. Buczkowski
    Database Inference Controller. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:311-322 [Conf]
  23. J. Thomas Haigh, Richard C. O'Brien, P. D. Stachour, Dana L. Toups
    The LDV Approach to Database Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:323-339 [Conf]
  24. Richard A. Kemmerer
    Formal Specification of a Mental Health Delivery System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:341-351 [Conf]
  25. Ravi S. Sandhu
    Discussion Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:353-365 [Conf]
  26. Marvin Schaefer, Brian Hubbard
    Report From IFIP Working Group 11.3, Database Management Security, Task Force on Technical Issues Relating to the TDI. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:367-376 [Conf]
  27. Carl E. Landwehr
    Research Question List, Answers, and Revision. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:377-394 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002