Conferences in DBLP
Peng Liu , Sushil Jajodia , Catherine D. McCollum Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:3-18 [Conf ] Anup K. Ghosh , Aaron Schwartzbard Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:19-32 [Conf ] Ravi Mukkamala , Jason Gagnon , Sushil Jajodia Integrating Data Mining Techniques with Intrusion Detection Methods. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:33-46 [Conf ] Joon S. Park , Ravi S. Sandhu , SreeLatha Ghanta RBAC on the Web by Secure Cookies. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:49-62 [Conf ] Ioannis Mavridis , George Pangalos , Marie Khair eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:63-78 [Conf ] Steven A. Demurjian , Y. He , T. C. Ting , M. Saba Software Agents for Role Based Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:79-93 [Conf ] William V. Maconachy , Thomas Harper , Donald G. Marks , Terry Mayfield Selected Topics in Infrastructure and Information Assurance (Panel). [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:97-113 [Conf ] Andrew Po-Jung Ho A Secret Splitting Method for Assuring the Confidentiality of Electronic Records. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:117-125 [Conf ] Joachim Biskup For Unknown Secrecies Refusal is Better than Lying. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:127-141 [Conf ] Savith Kandala , Ravi S. Sandhu Extending The BFA Workflow Authorization Model to Express Weighted Voting. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:145-159 [Conf ] Myong H. Kang , Judith N. Froscher , Brian J. Eppinger , Ira S. Moskowitz A Strategy for an MLS Workflow Management System. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:161-174 [Conf ] Tom Johnsten , Vijay V. Raghavan Impact of Decision-Region Based Classification Mining Algorithms on Database Security. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:177-191 [Conf ] Chris Clifton Protecting Against Data Mining through Samples. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:193-207 [Conf ] Arnon Rosenthal , Edward Sciore , Vinti Doshi Security Administration for Federations, Warehouses, and other Derived Data. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:209-223 [Conf ] T. C. Ting , Ming-Yuh Huang , D. Shayne Pitcock , Chris Clifton , Tsau Young Lin Panel on Intrusion Detection. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:227-234 [Conf ] Donald G. Marks Enforcing Integrity While Maintaining Secrecy. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:237-251 [Conf ] Adrian Spalka , Armin B. Cremers The Effect of Confidentiality on the Structure of Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:253-268 [Conf ] Steve Barker Temporal Authorization in the Simplified Event Calculus. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:271-284 [Conf ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari , Maria Luisa Sapino Specifying and Computing Hierarchies of Temporal Authorizations. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:285-300 [Conf ] Yasunori Ishihara , Toshiyuki Morita , Minoru Ito The Security Problem against Inference Attacks on Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:303-316 [Conf ] Yun Bai , Vijay Varadharajan A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:317-330 [Conf ]