The SCEAS System
Navigation Menu

Conferences in DBLP

Database Security (DBSec) (dbsec)
1990 (conf/dbsec/90)

  1. Bruce I. Blum
    Computer Security in a Clinical Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:1-12 [Conf]
  2. LouAnna Notargiacomo, Richard D. Graubart
    Health Delivery: The Problem solved? [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:13-26 [Conf]
  3. Richard A. Kemmerer
    A Multilevel Formal Specification of a Mental Health Care Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:27-52 [Conf]
  4. Matthew Morgenstern
    A Security Model for Multilevel Objects with Bidirectional Relationships. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:53-72 [Conf]
  5. Donald B. Faatz, David L. Spooner
    Discretionary Access Control in Object-Oriented Engineering Database Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1990, pp:73-84 [Conf]
  6. Ehud Gudes, Haiyan Song, Eduardo B. Fernández
    Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1990, pp:85-98 [Conf]
  7. Bhavani M. Thuraisingham
    Multilevel Security for Multimedia Database Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1990, pp:99-116 [Conf]
  8. Mike Martin, John E. Dobson
    Enterprise Modeling and Security Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:117-150 [Conf]
  9. D. J. Thomsen
    Role-Based Application Design and Enforcement. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:151-168 [Conf]
  10. Joachim Biskup
    A General Framework for Database Security (Abstract). [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:169-170 [Conf]
  11. Marshall D. Abrams, Gary W. Smith
    A Generalized Framework for Database Access Controls. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:171-178 [Conf]
  12. Ravi S. Sandhu
    Separation of Duties in Computerized Information Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:179-190 [Conf]
  13. Simon R. Wiseman
    The Control of Integrity in Databases. [Citation Graph (2, 0)][DBLP]
    DBSec, 1990, pp:191-204 [Conf]
  14. Edgar H. Sibley, Gary W. Smith
    On the Behavior of Multilevel Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:205-220 [Conf]
  15. David K. Hsiao, Matthew J. Kohler, Shawn W. Stround
    Query Modifications as a Means of Controlling Access to Multilevel Secure Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1990, pp:221-240 [Conf]
  16. Catherine Meadows
    Policies for Dynamic Upgrading. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:241-250 [Conf]
  17. Hilary H. Hosmer
    Shared Sensitivity Labels. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:251-264 [Conf]
  18. J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen
    The LDV Secure Relational DBMS Model. [Citation Graph (4, 0)][DBLP]
    DBSec, 1990, pp:265-280 [Conf]
  19. Teresa F. Lunt, Donovan Hsieh
    Update Semantics for a Multilevel Relational Database System. [Citation Graph (2, 0)][DBLP]
    DBSec, 1990, pp:281-296 [Conf]
  20. Sushil Jajodia, Ravi S. Sandhu
    Polyinstantiation Integrity in Multilevel Relations Revisited. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:297-308 [Conf]
  21. Barry Sowerbutts, Shanda Cordingley
    Database Architectonics and Inferential Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:309-325 [Conf]
  22. Tsau Young Lin
    Multilevel Database and Aggregated Security Algebra. [Citation Graph (1, 0)][DBLP]
    DBSec, 1990, pp:325-350 [Conf]
  23. Marvin Schaefer
    Reflexions on Current Issues in Trusted DBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:351-370 [Conf]
  24. David A. Bonyum
    The Third Stream: Long-Term Prospects for Secure Database Management. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:371-380 [Conf]
  25. John R. Campbell
    A Research and Development Program for Trusted Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:381-394 [Conf]
  26. Catherine Meadows
    Discussion Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:395-404 [Conf]
  27. Carl E. Landwehr
    Research Question List. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:405-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002