The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2002 (conf/dbsec/2002)

  1. András Belokosztolszki, David M. Eyers
    Shielding RBAC Infrastructures from Cyberterrorism. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:3-14 [Conf]
  2. Cecilia Ionita, Sylvia L. Osborn
    Privilege Administration for the Role Graph Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:15-25 [Conf]
  3. Steve Barker, Paul Douglas, Terry Fanning
    Implementing RBAC Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:27-36 [Conf]
  4. M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting
    Role Delegation for a Resource-Based Security Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:37-48 [Conf]
  5. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho
    Using X.509 Attribute Certificates for Role-Based EAM. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:49-60 [Conf]
  6. Lucas C. J. Dreyer, Martin S. Olivier
    Implementing Workflow Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:61-72 [Conf]
  7. Peng Liu, Ying Wang
    Multiphase Damage Confinement System for Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:75-87 [Conf]
  8. Prahalad Ragothaman, Brajendra Panda
    Analyzing Transaction Logs for Effective Damage Assessment. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:89-101 [Conf]
  9. Steve Barker
    Deductive Database Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:103-114 [Conf]
  10. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    Towards Secure XML Federations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:117-131 [Conf]
  11. Andrei Stoica, Csilla Farkas
    Secure XML Views. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:133-146 [Conf]
  12. Elisa Bertino, Elena Ferrari, Giovanni Mella
    Distributed Cooperative Updates of XML Documents. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:147-159 [Conf]
  13. Tom Johnsten, Vijay V. Raghavan, Kevin Hill
    On Security and Privacy Risks in Association Mining Algorithms. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:163-174 [Conf]
  14. Daniel Barbará, Rajni Goel, Sushil Jajodia
    Mining Malicious Corruption of Data with Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:175-189 [Conf]
  15. LiWu Chang, Ira S. Moskowitz
    A Study of Inference Problems in Distributed Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:191-204 [Conf]
  16. Vijayalakshmi Atluri, Pietro Mazzoleni
    Uniform Indexing for Geospatial Data and Authorizations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:207-218 [Conf]
  17. Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati
    Access Control of SVG Documents. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:219-230 [Conf]
  18. Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa
    On Modeling Computer Networks for Vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:233-244 [Conf]
  19. James C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich
    On-line Intrusion Protection by Detecting Attacks with Diversity. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:245-256 [Conf]
  20. Ravi Mukkamala, Satyam Das, Mahantesh Halappanavar
    Recertification: A Technique to Improve Services in PKI. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:259-270 [Conf]
  21. Joachim Biskup, Yücel Karabulut
    A Hybrid PKI Model: Application to Secure Mediation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:271-282 [Conf]
  22. Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale
    Implementation and Verification of Programmable Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:285-299 [Conf]
  23. Peter Ryan, Ragni Ryvold Arnesen
    A Process Algebraic Approach to Security Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:301-312 [Conf]
  24. Indrajit Ray, Indrakshi Ray
    Anonymous and Secure Multicast Subscription. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:313-327 [Conf]
  25. David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham
    Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:331-346 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002