Search the dblp DataBase
Sylvia L. Osborn :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sylvia L. Osborn , T. E. Heaven The Design of a Relational Database System with Abstract Data Types for Domains. [Citation Graph (21, 10)][DBLP ] ACM Trans. Database Syst., 1986, v:11, n:3, pp:357-373 [Journal ] Sylvia L. Osborn Identity, Equality and Query Optimization. [Citation Graph (18, 0)][DBLP ] OODBS, 1988, pp:346-351 [Conf ] Sylvia L. Osborn Towards a Universal Relation Interface. [Citation Graph (15, 13)][DBLP ] VLDB, 1979, pp:52-60 [Conf ] Claudio L. Lucchesi , Sylvia L. Osborn Candidate Keys for Relations. [Citation Graph (10, 0)][DBLP ] J. Comput. Syst. Sci., 1978, v:17, n:2, pp:270-279 [Journal ] Sylvia L. Osborn Testing for Existence of a Covering Boyce-Codd normal Form. [Citation Graph (8, 0)][DBLP ] Inf. Process. Lett., 1979, v:8, n:1, pp:11-14 [Journal ] Sylvia L. Osborn The Role of Polymorphism in Schema Evolution in an Object-Oriented Database. [Citation Graph (7, 11)][DBLP ] IEEE Trans. Knowl. Data Eng., 1989, v:1, n:3, pp:310-317 [Journal ] Li Yu , Sylvia L. Osborn An Evaluation Framework for Algebraic Object-Oriented Query Models. [Citation Graph (4, 33)][DBLP ] ICDE, 1991, pp:670-677 [Conf ] Matunda Nyanchama , Sylvia L. Osborn Access Rights Administration in Role-Based Security Systems. [Citation Graph (1, 0)][DBLP ] DBSec, 1994, pp:37-56 [Conf ] Mei Ge , Sylvia L. Osborn A Design for Parameterized Roles. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:251-264 [Conf ] Cecilia Ionita , Sylvia L. Osborn Privilege Administration for the Role Graph Model. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:15-25 [Conf ] Matunda Nyanchama , Sylvia L. Osborn Modeling Mandatory Access Control in Role-Based Security Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:129-144 [Conf ] Sylvia L. Osborn Database Security Integration using Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:245-258 [Conf ] Sylvia L. Osborn , L. Reid , G. Wesson On the Interaction Between Role-Based Access Control and Relational Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:275-287 [Conf ] Sylvia L. Osborn , Bhavani M. Thuraisingham , Pierangela Samarati Panel on XML and Security. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:317-323 [Conf ] Reind P. van de Riet , Raban Serban , Sylvia L. Osborn , Arnon Rosenthal , Vijayalakshmi Atluri , Joachim Biskup , Gio Wiederhold Panel. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:373- [Conf ] He Wang , Sylvia L. Osborn An Administrative Model for Role Graphs. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:302-315 [Conf ] Li Yu , Sylvia L. Osborn Context Inheritance and Content Inheritance in an Object-Oriented Data Model. [Citation Graph (0, 0)][DBLP ] ICCI, 1991, pp:240-251 [Conf ] Matunda Nyanchama , Sylvia L. Osborn Database Security Issues in Distributed Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] IWDOM, 1992, pp:92-97 [Conf ] Sylvia L. Osborn Object Modelling. [Citation Graph (0, 0)][DBLP ] OODBS, 1986, pp:231- [Conf ] Matunda Nyanchama , Sylvia L. Osborn The role graph model. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf ] Sylvia L. Osborn Mandatory access control and role-based access control revisited. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 1997, pp:31-40 [Conf ] Sylvia L. Osborn , Yuxia Guo Modeling users in role-based access control. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:31-37 [Conf ] Sylvia L. Osborn , Yan Han , Jun Liu A methodology for managing roles in legacy systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:33-40 [Conf ] Sylvia L. Osborn Information flow analysis of an RBAC system. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:163-168 [Conf ] Elisa Bertino , Trent Jaeger , Jonathan D. Moffett , Sylvia L. Osborn , Ravi Ravi Making access control more usable. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:141- [Conf ] Jingzhu Wang , Sylvia L. Osborn A role-based approach to access control for XML databases. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:70-77 [Conf ] He Wang , Sylvia L. Osborn Delegation in the role graph model. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:91-100 [Conf ] Cecilia Ionita , Sylvia L. Osborn Specifying an Access Control Model for Ontologies for the Semantic Web. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2005, pp:73-85 [Conf ] Shengli Sheng , Sylvia L. Osborn A Classifier-Based Approach to User-Role Assignment for Web Applications. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2004, pp:163-171 [Conf ] Yunyu Song , Sylvia L. Osborn Conflict of Interest in the Administrative Role Graph Model. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:100-114 [Conf ] Sylvia L. Osborn Integrating role graphs: a tool for security integration. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:43, n:3, pp:317-333 [Journal ] Sylvia L. Osborn , Li Yu Unifying Data, Behaviours, and Messages in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1996, v:18, n:1, pp:29-54 [Journal ] Matunda Nyanchama , Sylvia L. Osborn Role-Based Security, Object Oriented Databases & Separation of Duty. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1993, v:22, n:4, pp:45-51 [Journal ] Matunda Nyanchama , Sylvia L. Osborn The Role Graph Model and Conflict of Interest. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:3-33 [Journal ] Sylvia L. Osborn , Ravi S. Sandhu , Qamar Munawer Configuring role-based access control to enforce mandatory and discretionary access control policies. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:2, pp:85-106 [Journal ] F. Bukhari , Sylvia L. Osborn Two Fully Distributed Concurrency Control Algorithms. [Citation Graph (0, 6)][DBLP ] IEEE Trans. Knowl. Data Eng., 1993, v:5, n:5, pp:872-881 [Journal ] He Wang , Sylvia L. Osborn Discretionary access control with the administrative role graph model. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:151-156 [Conf ] Xin Jin , Sylvia L. Osborn Architecture for Data Collection in Database Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:96-107 [Conf ] Role-based access control: past, present and future. [Citation Graph (, )][DBLP ] A Methodology for Bridging between RBAC and an Arbitrary Application Program. [Citation Graph (, )][DBLP ] Database Intrusion Detection Using Role Profiling with Role Hierarchy. [Citation Graph (, )][DBLP ] A Safe RSS Approach for Securely Sharing Mobile SVG Biomedical Images for Web 2.0. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs