The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA) (oopsla)
1993 (conf/oopsla/1993w)

  1. Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting
    Security for Object-Oriented Systems: An Editorial Overview. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:1-7 [Conf]
  2. George Pangalos
    Integrating Object Oriented Technology and Security in Medical Database Systems. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:11-24 [Conf]
  3. Barry Bird
    The Security Facilities of PCTE. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:25-42 [Conf]
  4. Karin Vosseberg, Peter Brössler, James Leslie Keedy
    A Base for Secure Object Oriented Environments. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:43-54 [Conf]
  5. James Alan Talvitie
    An Object-Oriented Application Security Framework. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:55-75 [Conf]
  6. Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian
    Multilevel Security in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:79-89 [Conf]
  7. Sarbari Gupta
    Object-Oriented Security in the Trusted MachTM Operating System. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:90-95 [Conf]
  8. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Enforcing Mandatory Access Control in Object Bases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:96-116 [Conf]
  9. Ciarán Bryce
    Information Flow Control in Object-Oriented Programs. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:117-132 [Conf]
  10. Eduardo B. Fernández, María M. Larrondo-Petrie, Ehud Gudes
    A Method-Based Authorization Model for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:135-150 [Conf]
  11. Steven A. Demurjian, T. C. Ting
    The Factors that Influence Apropos Security Approaches for the Object-Oriented Paradigm. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:151-165 [Conf]
  12. Ciarán Bryce
    An Access Control Model or a Parallel Object-Based Programming Language. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:166-182 [Conf]
  13. Elisa Bertino, Pierangela Samarati
    Research Issues in Discretionary Authorizations for Object Bases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:183-199 [Conf]
  14. Myong H. Kang, Oliver Costich, Judith N. Froscher
    Using Object Modeling Techniques to Design MLS Data Models. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:203-211 [Conf]
  15. William R. Herndon
    Can We Do Without Monotonically Non-Decreasing Levels in Class Hierarchies? [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:212-217 [Conf]
  16. Roshan K. Thomas, Ravi S. Sandhu
    Concurrency, Synchronization, and Scheduling to Support High-Assurance Write-Up in Multilevel Object-Based Computing. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:218-228 [Conf]
  17. Vicki Ellen Jones, Marianne Winslett
    Secure Database Interoperation via Dynamic Addition of Roles. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:229-234 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002