The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1996 (conf/dbsec/1996)

  1. Teresa F. Lunt
    Strategic Directions in Computer Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:3-10 [Conf]
  2. Bhavani M. Thuraisingham
    Security Issues for Data Warehousing and Data Mining. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:11-20 [Conf]
  3. Zahir Tari, George Fernandez
    Security Enforcement in the DOK Federated Database System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:23-42 [Conf]
  4. Martin S. Olivier
    Integrity Constraints in Federated Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:43-57 [Conf]
  5. Silvana Castano
    An Approach to Deriving Global Authorizations in Federated Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:58-75 [Conf]
  6. Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala
    Multilevel Secure Transaction Processing: Status and Prospects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:79-98 [Conf]
  7. J. Halle, Jody Threet, Sujeet Shenoi
    A Framework for High Assurance Security of Distributed Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:101-119 [Conf]
  8. Reind P. van de Riet, Ehud Gudes
    An Object-Oriented Database Architecture for Providing Securty in Cyberspace. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:120-144 [Conf]
  9. Frédéric Cuppens, Alban Gabillon
    A Logical Approach to Model a Multilevel Object-Oriented Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:145-166 [Conf]
  10. Ravi S. Sandhu, J. Campbell
    Open Issues in Database Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:169-173 [Conf]
  11. Sushil Jajodia, Luigi V. Mancini, Indrajit Ray
    Secure Locking Protocols for Multilevel Database Management Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1996, pp:177-194 [Conf]
  12. G. Grossman, Marvin Schaefer
    A Data Model for a Multilevel Replicated X.500 Server. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:195-211 [Conf]
  13. Janet Aisbett
    An Information Theoretic Analysis of Architectures for Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:212-225 [Conf]
  14. Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf
    A Framework for Inference-Directed Data Mining. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:229-239 [Conf]
  15. Vijayalakshmi Atluri, Wei-kuang Huang
    An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:240-258 [Conf]
  16. Ravi S. Sandhu, LouAnna Notargiacomo, D. Thomas, Jesse C. Worthington
    Implementation Experiences and Prospects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:261-271 [Conf]
  17. Sylvia L. Osborn, L. Reid, G. Wesson
    On the Interaction Between Role-Based Access Control and Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:275-287 [Conf]
  18. Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu
    Extensible and Reusable Role-Based Object-Oriented Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:288-307 [Conf]
  19. David L. Spooner
    Summary of the Working Conference. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:308-310 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002