The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2001 (conf/dbsec/2001)

  1. Sushil Jajodia, Duminda Wijesekera
    Recent Advances in Access Control Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:3-15 [Conf]
  2. Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu
    Role-based Access Control on the Web Using LDAP. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:19-30 [Conf]
  3. Wee-Yeh Tan
    Constraints-based Access Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:31-44 [Conf]
  4. Savith Kandala, Ravi S. Sandhu
    Secure Role-Based Workflow Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:45-58 [Conf]
  5. Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia
    Subject Switching Algorithms for Access Control in Federated Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:61-74 [Conf]
  6. Peng Liu, Xu Hao
    Efficient Damage Assessment and Repair in Resilient Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:75-89 [Conf]
  7. Arnon Rosenthal, Edward Sciore
    Administering Permissions for Distributed Data: Factoring and Automated Inference. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:91-104 [Conf]
  8. Joachim Biskup, Thomas Leineweber
    State-Dependent Security Decisions for Distributed Object-Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:105-118 [Conf]
  9. Rumman Sobhan, Brajendra Panda
    Reorganization of Database Log for Information Warfare Data Recovery. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:121-134 [Conf]
  10. Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth E. Longdon
    Randomly roving agents for intrusion detection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:135-149 [Conf]
  11. G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi
    Public Telephone Network Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:151-164 [Conf]
  12. Steve Barker, Arnon Rosenthal
    Flexible Security Policies in SQL. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:167-180 [Conf]
  13. Csilla Farkas, Tyrone S. Toland, Caroline M. Eastman
    The Inference Problem and Updates in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:181-194 [Conf]
  14. Adrian Spalka
    Managing Classified Documents in a Relational Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:195-208 [Conf]
  15. Alexandre Hardy, Martin S. Olivier
    A Comparison Between ConSA and Current Linux Security Implementations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:211-224 [Conf]
  16. Ravi Mukkamala, Sushil Jajodia
    A Novel Approach to Certificate Revocation Management. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:225-238 [Conf]
  17. Pramote Luenam, Peng Liu
    ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:239-252 [Conf]
  18. Vijayalakshmi Atluri, Ravi Mukkamala
    An Extended Transaction Model Approach for Multilevel Secure Transaction Processing. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:255-268 [Conf]
  19. Marta Oliva, Fèlix Saltor
    Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:269-282 [Conf]
  20. Tom Johnsten, Vijay V. Raghavan
    Security Procedures for Classification Mining Algorithms. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:285-297 [Conf]
  21. Alban Gabillon, Emmanuel Bruno
    Regulating Access to XML documents. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:299-314 [Conf]
  22. Sylvia L. Osborn, Bhavani M. Thuraisingham, Pierangela Samarati
    Panel on XML and Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:317-323 [Conf]
  23. David L. Spooner, Martin S. Olivier
    Selected Summary of Discussions. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:325-335 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002