The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
2006 (conf/dbsec/2006)

  1. Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
    Creating Objects in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:1-14 [Conf]
  2. Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham
    Detection and Resolution of Anomalies in Firewall Policy Rules. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:15-29 [Conf]
  3. Joachim Biskup, Lena Wiese
    On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:30-43 [Conf]
  4. Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz
    Consolidating the Access Control of Composite Applications and Workflows. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:44-59 [Conf]
  5. Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan
    Authenticating Multi-dimensional Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:60-73 [Conf]
  6. Julien Lafaye, David Gross-Amblard
    XML Streams Watermarking. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:74-88 [Conf]
  7. Einar Mykletun, Gene Tsudik
    Aggregation Queries in the Database-As-a-Service Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:89-103 [Conf]
  8. Nataliya Rassadko
    Policy Classes and Query Rewriting Algorithm for XML Security Views. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:104-118 [Conf]
  9. Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
    Interactive Analysis of Attack Graphs Using Relational Queries. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:119-132 [Conf]
  10. Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
    Notarized Federated Identity Management for Web Services. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:133-147 [Conf]
  11. Noa Tuval, Ehud Gudes
    Resolving Information Flow Conflicts in RBAC Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:148-162 [Conf]
  12. Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
    Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:163-178 [Conf]
  13. Steve Barker, Maribel Fernández
    Term Rewriting for Access Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:179-193 [Conf]
  14. Jason Crampton
    Discretionary and Mandatory Controls for Role-Based Administration. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:194-208 [Conf]
  15. Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari
    A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:209-223 [Conf]
  16. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Enhancing User Privacy Through Data Handling Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:224-236 [Conf]
  17. Vijayalakshmi Atluri, Heechang Shin
    Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:237-251 [Conf]
  18. Indrajit Ray, Sudip Chakraborty
    A Framework for Flexible Access Control in Digital Library Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:252-266 [Conf]
  19. Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe
    Authrule: A Generic Rule-Based Authorization Module. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:267-281 [Conf]
  20. Geri Georg, Siv Hilde Houmb, Indrakshi Ray
    Aspect-Oriented Risk Driven Development of Secure Applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:282-296 [Conf]
  21. Philip Robinson, Florian Kerschbaum, Andreas Schaad
    From Business Process Choreography to Authorization Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:297-309 [Conf]
  22. Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu
    Information Theoretical Analysis of Two-Party Secret Computation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:310-317 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002