|
Conferences in DBLP
- Anup K. Ghosh
E-Commerce Security: No Silver Bullet. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:3-16 [Conf]
- Joachim Biskup
Technical Enforcement of Informational Assurances. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:17-40 [Conf]
- Wei-kuang Huang, Vijayalakshmi Atluri
Analysing the Safety of Workflow Authorization Models. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:43-57 [Conf]
- Silvana Castano, Maria Grazia Fugini
Rules and Patterns for Security in Workflow Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:59-74 [Conf]
- Lucas C. J. Dreyer, Martin S. Olivier
An Information-Flow for Privacy (InfoPriv). [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:77-90 [Conf]
- Ehud Gudes, Martin S. Olivier
Security Policies in Replicated and Autonomous Databases. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:93-107 [Conf]
- John Hale, Mauricio Papa, Sujeet Shenoi
Programmable Security for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:109-123 [Conf]
- Joachim Biskup, Ulrich Flegel, Yücel Karabulut
Secure Mediation: Requirements and Design. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:127-140 [Conf]
- Brajendra Panda, Joseph Giordano
Reconstructing the Database after Electronic Attacks. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:143-156 [Conf]
- Ramprasad Sripada, Thomas F. Keefe
Version Management in the STAR MLS Database System. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:159-171 [Conf]
- Jérôme Carrère, Frédéric Cuppens, Claire Saurel
SACADDOS: A Support Tool to Manage Multilevel Documents. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:173-188 [Conf]
- Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, A. Min Tjoa
Using Role-Templates for Handling Recurring Role Structures. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:191-204 [Conf]
- Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting
Role Based Security and Java. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:205-219 [Conf]
- Astrid Lubinski
Security Issues in Mobile Database Access. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:223-234 [Conf]
- LiWu Chang, Ira S. Moskowitz
Bayesian Methods to the Database Inference Problem. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:237-251 [Conf]
- Raymond W. Yip, Karl N. Levitt
The Design and Implementation of a Data Level Database Inference Detection System. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:253-266 [Conf]
- Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier
Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:269-284 [Conf]
- Vijayalakshmi Atluri, David L. Spooner
Workshop Summary. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:287-293 [Conf]
|