Conferences in DBLP
Bhavani M. Thuraisingham , Linda Schlipper , Pierangela Samarati , Tsau Young Lin , Sushil Jajodia , Chris Clifton Security Issues in Data Warehousing and Data Mining: Panel Discussion. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:3-16 [Conf ] Catherine D. McCollum , Donald B. Faatz , William R. Herndon , E. John Sebes , Roshan K. Thomas Distributed Object Technologies, Databases and Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:17-31 [Conf ] Zahir Tari Designing Security Agents for the DOK Federated System. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:35-59 [Conf ] Gio Wiederhold , Michel Bilello , Chris Donahue Web Implementation of a Security Mediator for Medical Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:60-72 [Conf ] Sang Hyuk Son , Craig Chaney Supporting the Requirements for Multilevel Secure and Real-Time Databases in Distributed Environments. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:73-91 [Conf ] Elisa Bertino , Elena Ferrari A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:95-109 [Conf ] Masha Gendler-Fishman , Ehud Gudes Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:110-133 [Conf ] John Hale , Jody Threet , Sujeet Shenoi Capability-Based Primitives for Access Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:134-148 [Conf ] Vijayalakshmi Atluri , Wei-kuang Huang , Elisa Bertino An Execution Model for Multilevel Seccure Workflows. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:151-165 [Conf ] Roshan K. Thomas , Ravi S. Sandhu Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:166-181 [Conf ] Ehud Gudes , Reind P. van de Riet , J. F. M. Burg , Martin S. Olivier Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:182-195 [Conf ] Sushil Jajodia , Ravi Mukkamala , Indrajit Ray A Two-tier Coarse Indexing Scheme for MLS Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:199-218 [Conf ] John P. McDermott Replication Does Survive Information Warfare Attacks. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:219-228 [Conf ] Chanjung Park , Seog Park , Sang Hyuk Son Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:229-244 [Conf ] Steven A. Demurjian , T. C. Ting , John A. Reisner Software Architectural Alternatives for User Role-Based Security Policies. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:247-261 [Conf ] Ravi S. Sandhu , Venkata Bhamidipati The URA97 Model for Role-Based User-Role Assignment. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:262-275 [Conf ] Kan Zhang IRI: A Quantitative Approach to Inference Analysis in Relational Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:279-290 [Conf ] Adrian Spalka , Armin B. Cremers Structured Name-Spaces in Secure Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:291-306 [Conf ] Tsau Young Lin , Xiaoling Zuo Multilevel Decision Logic: A Formalism for Rules Mining. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:307-321 [Conf ] Wolfgang Eßmayr , Günther Pernul , A. Min Tjoa Access Controls by Object-Oriented Concepts. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:325-340 [Conf ] Elisa Bertino , Elena Ferrari Administration Policies in a Multipolicy Autorization System. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:341-355 [Conf ] Latanya Sweeney Datafly: A System for Providing Anonymity in Medical Data. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:356-381 [Conf ] M. Berryman , C. Rummel , Mauricio Papa , John Hale , Jody Threet , Sujeet Shenoi An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:385-388 [Conf ] G. Lorentz , S. Dangi , D. Jones , P. Carpenter , Sujeet Shenoi Implementing Advanced Internet Search Engines. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:389-391 [Conf ]