|
Conferences in DBLP
- András Belokosztolszki, David M. Eyers
Shielding RBAC Infrastructures from Cyberterrorism. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:3-14 [Conf]
- Cecilia Ionita, Sylvia L. Osborn
Privilege Administration for the Role Graph Model. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:15-25 [Conf]
- Steve Barker, Paul Douglas, Terry Fanning
Implementing RBAC Policies. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:27-36 [Conf]
- M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting
Role Delegation for a Resource-Based Security Model. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:37-48 [Conf]
- Dongwan Shin, Gail-Joon Ahn, Sangrae Cho
Using X.509 Attribute Certificates for Role-Based EAM. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:49-60 [Conf]
- Lucas C. J. Dreyer, Martin S. Olivier
Implementing Workflow Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:61-72 [Conf]
- Peng Liu, Ying Wang
Multiphase Damage Confinement System for Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:75-87 [Conf]
- Prahalad Ragothaman, Brajendra Panda
Analyzing Transaction Logs for Effective Damage Assessment. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:89-101 [Conf]
- Steve Barker
Deductive Database Security. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:103-114 [Conf]
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
Towards Secure XML Federations. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:117-131 [Conf]
- Andrei Stoica, Csilla Farkas
Secure XML Views. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:133-146 [Conf]
- Elisa Bertino, Elena Ferrari, Giovanni Mella
Distributed Cooperative Updates of XML Documents. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:147-159 [Conf]
- Tom Johnsten, Vijay V. Raghavan, Kevin Hill
On Security and Privacy Risks in Association Mining Algorithms. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:163-174 [Conf]
- Daniel Barbará, Rajni Goel, Sushil Jajodia
Mining Malicious Corruption of Data with Hidden Markov Models. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:175-189 [Conf]
- LiWu Chang, Ira S. Moskowitz
A Study of Inference Problems in Distributed Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:191-204 [Conf]
- Vijayalakshmi Atluri, Pietro Mazzoleni
Uniform Indexing for Geospatial Data and Authorizations. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:207-218 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati
Access Control of SVG Documents. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:219-230 [Conf]
- Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa
On Modeling Computer Networks for Vulnerability Analysis. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:233-244 [Conf]
- James C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich
On-line Intrusion Protection by Detecting Attacks with Diversity. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:245-256 [Conf]
- Ravi Mukkamala, Satyam Das, Mahantesh Halappanavar
Recertification: A Technique to Improve Services in PKI. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:259-270 [Conf]
- Joachim Biskup, Yücel Karabulut
A Hybrid PKI Model: Application to Secure Mediation. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:271-282 [Conf]
- Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale
Implementation and Verification of Programmable Security. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:285-299 [Conf]
- Peter Ryan, Ragni Ryvold Arnesen
A Process Algebraic Approach to Security Policies. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:301-312 [Conf]
- Indrajit Ray, Indrakshi Ray
Anonymous and Secure Multicast Subscription. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:313-327 [Conf]
- David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham
Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:331-346 [Conf]
|