The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1997 (conf/dbsec/1997)

  1. Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton
    Security Issues in Data Warehousing and Data Mining: Panel Discussion. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:3-16 [Conf]
  2. Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas
    Distributed Object Technologies, Databases and Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:17-31 [Conf]
  3. Zahir Tari
    Designing Security Agents for the DOK Federated System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:35-59 [Conf]
  4. Gio Wiederhold, Michel Bilello, Chris Donahue
    Web Implementation of a Security Mediator for Medical Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:60-72 [Conf]
  5. Sang Hyuk Son, Craig Chaney
    Supporting the Requirements for Multilevel Secure and Real-Time Databases in Distributed Environments. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:73-91 [Conf]
  6. Elisa Bertino, Elena Ferrari
    A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:95-109 [Conf]
  7. Masha Gendler-Fishman, Ehud Gudes
    Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:110-133 [Conf]
  8. John Hale, Jody Threet, Sujeet Shenoi
    Capability-Based Primitives for Access Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:134-148 [Conf]
  9. Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino
    An Execution Model for Multilevel Seccure Workflows. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:151-165 [Conf]
  10. Roshan K. Thomas, Ravi S. Sandhu
    Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:166-181 [Conf]
  11. Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier
    Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:182-195 [Conf]
  12. Sushil Jajodia, Ravi Mukkamala, Indrajit Ray
    A Two-tier Coarse Indexing Scheme for MLS Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:199-218 [Conf]
  13. John P. McDermott
    Replication Does Survive Information Warfare Attacks. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:219-228 [Conf]
  14. Chanjung Park, Seog Park, Sang Hyuk Son
    Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:229-244 [Conf]
  15. Steven A. Demurjian, T. C. Ting, John A. Reisner
    Software Architectural Alternatives for User Role-Based Security Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:247-261 [Conf]
  16. Ravi S. Sandhu, Venkata Bhamidipati
    The URA97 Model for Role-Based User-Role Assignment. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:262-275 [Conf]
  17. Kan Zhang
    IRI: A Quantitative Approach to Inference Analysis in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:279-290 [Conf]
  18. Adrian Spalka, Armin B. Cremers
    Structured Name-Spaces in Secure Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:291-306 [Conf]
  19. Tsau Young Lin, Xiaoling Zuo
    Multilevel Decision Logic: A Formalism for Rules Mining. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:307-321 [Conf]
  20. Wolfgang Eßmayr, Günther Pernul, A. Min Tjoa
    Access Controls by Object-Oriented Concepts. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:325-340 [Conf]
  21. Elisa Bertino, Elena Ferrari
    Administration Policies in a Multipolicy Autorization System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:341-355 [Conf]
  22. Latanya Sweeney
    Datafly: A System for Providing Anonymity in Medical Data. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:356-381 [Conf]
  23. M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi
    An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:385-388 [Conf]
  24. G. Lorentz, S. Dangi, D. Jones, P. Carpenter, Sujeet Shenoi
    Implementing Advanced Internet Search Engines. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:389-391 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002