The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1999 (conf/dbsec/1999)

  1. Peng Liu, Sushil Jajodia, Catherine D. McCollum
    Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:3-18 [Conf]
  2. Anup K. Ghosh, Aaron Schwartzbard
    Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:19-32 [Conf]
  3. Ravi Mukkamala, Jason Gagnon, Sushil Jajodia
    Integrating Data Mining Techniques with Intrusion Detection Methods. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:33-46 [Conf]
  4. Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta
    RBAC on the Web by Secure Cookies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:49-62 [Conf]
  5. Ioannis Mavridis, George Pangalos, Marie Khair
    eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:63-78 [Conf]
  6. Steven A. Demurjian, Y. He, T. C. Ting, M. Saba
    Software Agents for Role Based Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:79-93 [Conf]
  7. William V. Maconachy, Thomas Harper, Donald G. Marks, Terry Mayfield
    Selected Topics in Infrastructure and Information Assurance (Panel). [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:97-113 [Conf]
  8. Andrew Po-Jung Ho
    A Secret Splitting Method for Assuring the Confidentiality of Electronic Records. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:117-125 [Conf]
  9. Joachim Biskup
    For Unknown Secrecies Refusal is Better than Lying. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:127-141 [Conf]
  10. Savith Kandala, Ravi S. Sandhu
    Extending The BFA Workflow Authorization Model to Express Weighted Voting. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:145-159 [Conf]
  11. Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz
    A Strategy for an MLS Workflow Management System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:161-174 [Conf]
  12. Tom Johnsten, Vijay V. Raghavan
    Impact of Decision-Region Based Classification Mining Algorithms on Database Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:177-191 [Conf]
  13. Chris Clifton
    Protecting Against Data Mining through Samples. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:193-207 [Conf]
  14. Arnon Rosenthal, Edward Sciore, Vinti Doshi
    Security Administration for Federations, Warehouses, and other Derived Data. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:209-223 [Conf]
  15. T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin
    Panel on Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:227-234 [Conf]
  16. Donald G. Marks
    Enforcing Integrity While Maintaining Secrecy. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:237-251 [Conf]
  17. Adrian Spalka, Armin B. Cremers
    The Effect of Confidentiality on the Structure of Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:253-268 [Conf]
  18. Steve Barker
    Temporal Authorization in the Simplified Event Calculus. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:271-284 [Conf]
  19. Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino
    Specifying and Computing Hierarchies of Temporal Authorizations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:285-300 [Conf]
  20. Yasunori Ishihara, Toshiyuki Morita, Minoru Ito
    The Security Problem against Inference Attacks on Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:303-316 [Conf]
  21. Yun Bai, Vijay Varadharajan
    A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:317-330 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002