The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1998 (conf/dbsec/1998)

  1. Anup K. Ghosh
    E-Commerce Security: No Silver Bullet. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:3-16 [Conf]
  2. Joachim Biskup
    Technical Enforcement of Informational Assurances. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:17-40 [Conf]
  3. Wei-kuang Huang, Vijayalakshmi Atluri
    Analysing the Safety of Workflow Authorization Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:43-57 [Conf]
  4. Silvana Castano, Maria Grazia Fugini
    Rules and Patterns for Security in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:59-74 [Conf]
  5. Lucas C. J. Dreyer, Martin S. Olivier
    An Information-Flow for Privacy (InfoPriv). [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:77-90 [Conf]
  6. Ehud Gudes, Martin S. Olivier
    Security Policies in Replicated and Autonomous Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:93-107 [Conf]
  7. John Hale, Mauricio Papa, Sujeet Shenoi
    Programmable Security for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:109-123 [Conf]
  8. Joachim Biskup, Ulrich Flegel, Yücel Karabulut
    Secure Mediation: Requirements and Design. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:127-140 [Conf]
  9. Brajendra Panda, Joseph Giordano
    Reconstructing the Database after Electronic Attacks. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:143-156 [Conf]
  10. Ramprasad Sripada, Thomas F. Keefe
    Version Management in the STAR MLS Database System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:159-171 [Conf]
  11. Jérôme Carrère, Frédéric Cuppens, Claire Saurel
    SACADDOS: A Support Tool to Manage Multilevel Documents. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:173-188 [Conf]
  12. Wolfgang Eßmayr, Elisabeth Kapsammer, Roland Wagner, A. Min Tjoa
    Using Role-Templates for Handling Recurring Role Structures. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:191-204 [Conf]
  13. Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting
    Role Based Security and Java. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:205-219 [Conf]
  14. Astrid Lubinski
    Security Issues in Mobile Database Access. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:223-234 [Conf]
  15. LiWu Chang, Ira S. Moskowitz
    Bayesian Methods to the Database Inference Problem. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:237-251 [Conf]
  16. Raymond W. Yip, Karl N. Levitt
    The Design and Implementation of a Data Level Database Inference Detection System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:253-266 [Conf]
  17. Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier
    Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:269-284 [Conf]
  18. Vijayalakshmi Atluri, David L. Spooner
    Workshop Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:287-293 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002