The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sylvia L. Osborn: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sylvia L. Osborn, T. E. Heaven
    The Design of a Relational Database System with Abstract Data Types for Domains. [Citation Graph (21, 10)][DBLP]
    ACM Trans. Database Syst., 1986, v:11, n:3, pp:357-373 [Journal]
  2. Sylvia L. Osborn
    Identity, Equality and Query Optimization. [Citation Graph (18, 0)][DBLP]
    OODBS, 1988, pp:346-351 [Conf]
  3. Sylvia L. Osborn
    Towards a Universal Relation Interface. [Citation Graph (15, 13)][DBLP]
    VLDB, 1979, pp:52-60 [Conf]
  4. Claudio L. Lucchesi, Sylvia L. Osborn
    Candidate Keys for Relations. [Citation Graph (10, 0)][DBLP]
    J. Comput. Syst. Sci., 1978, v:17, n:2, pp:270-279 [Journal]
  5. Sylvia L. Osborn
    Testing for Existence of a Covering Boyce-Codd normal Form. [Citation Graph (8, 0)][DBLP]
    Inf. Process. Lett., 1979, v:8, n:1, pp:11-14 [Journal]
  6. Sylvia L. Osborn
    The Role of Polymorphism in Schema Evolution in an Object-Oriented Database. [Citation Graph (7, 11)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1989, v:1, n:3, pp:310-317 [Journal]
  7. Li Yu, Sylvia L. Osborn
    An Evaluation Framework for Algebraic Object-Oriented Query Models. [Citation Graph (4, 33)][DBLP]
    ICDE, 1991, pp:670-677 [Conf]
  8. Matunda Nyanchama, Sylvia L. Osborn
    Access Rights Administration in Role-Based Security Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:37-56 [Conf]
  9. Mei Ge, Sylvia L. Osborn
    A Design for Parameterized Roles. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:251-264 [Conf]
  10. Cecilia Ionita, Sylvia L. Osborn
    Privilege Administration for the Role Graph Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:15-25 [Conf]
  11. Matunda Nyanchama, Sylvia L. Osborn
    Modeling Mandatory Access Control in Role-Based Security Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:129-144 [Conf]
  12. Sylvia L. Osborn
    Database Security Integration using Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:245-258 [Conf]
  13. Sylvia L. Osborn, L. Reid, G. Wesson
    On the Interaction Between Role-Based Access Control and Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:275-287 [Conf]
  14. Sylvia L. Osborn, Bhavani M. Thuraisingham, Pierangela Samarati
    Panel on XML and Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:317-323 [Conf]
  15. Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold
    Panel. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:373- [Conf]
  16. He Wang, Sylvia L. Osborn
    An Administrative Model for Role Graphs. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:302-315 [Conf]
  17. Li Yu, Sylvia L. Osborn
    Context Inheritance and Content Inheritance in an Object-Oriented Data Model. [Citation Graph (0, 0)][DBLP]
    ICCI, 1991, pp:240-251 [Conf]
  18. Matunda Nyanchama, Sylvia L. Osborn
    Database Security Issues in Distributed Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    IWDOM, 1992, pp:92-97 [Conf]
  19. Sylvia L. Osborn
    Object Modelling. [Citation Graph (0, 0)][DBLP]
    OODBS, 1986, pp:231- [Conf]
  20. Matunda Nyanchama, Sylvia L. Osborn
    The role graph model. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  21. Sylvia L. Osborn
    Mandatory access control and role-based access control revisited. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:31-40 [Conf]
  22. Sylvia L. Osborn, Yuxia Guo
    Modeling users in role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:31-37 [Conf]
  23. Sylvia L. Osborn, Yan Han, Jun Liu
    A methodology for managing roles in legacy systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:33-40 [Conf]
  24. Sylvia L. Osborn
    Information flow analysis of an RBAC system. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:163-168 [Conf]
  25. Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi
    Making access control more usable. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:141- [Conf]
  26. Jingzhu Wang, Sylvia L. Osborn
    A role-based approach to access control for XML databases. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:70-77 [Conf]
  27. He Wang, Sylvia L. Osborn
    Delegation in the role graph model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:91-100 [Conf]
  28. Cecilia Ionita, Sylvia L. Osborn
    Specifying an Access Control Model for Ontologies for the Semantic Web. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:73-85 [Conf]
  29. Shengli Sheng, Sylvia L. Osborn
    A Classifier-Based Approach to User-Role Assignment for Web Applications. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:163-171 [Conf]
  30. Yunyu Song, Sylvia L. Osborn
    Conflict of Interest in the Administrative Role Graph Model. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:100-114 [Conf]
  31. Sylvia L. Osborn
    Integrating role graphs: a tool for security integration. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:43, n:3, pp:317-333 [Journal]
  32. Sylvia L. Osborn, Li Yu
    Unifying Data, Behaviours, and Messages in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1996, v:18, n:1, pp:29-54 [Journal]
  33. Matunda Nyanchama, Sylvia L. Osborn
    Role-Based Security, Object Oriented Databases & Separation of Duty. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1993, v:22, n:4, pp:45-51 [Journal]
  34. Matunda Nyanchama, Sylvia L. Osborn
    The Role Graph Model and Conflict of Interest. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:3-33 [Journal]
  35. Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer
    Configuring role-based access control to enforce mandatory and discretionary access control policies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:2, pp:85-106 [Journal]
  36. F. Bukhari, Sylvia L. Osborn
    Two Fully Distributed Concurrency Control Algorithms. [Citation Graph (0, 6)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1993, v:5, n:5, pp:872-881 [Journal]
  37. He Wang, Sylvia L. Osborn
    Discretionary access control with the administrative role graph model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:151-156 [Conf]
  38. Xin Jin, Sylvia L. Osborn
    Architecture for Data Collection in Database Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:96-107 [Conf]

  39. Role-based access control: past, present and future. [Citation Graph (, )][DBLP]


  40. A Methodology for Bridging between RBAC and an Arbitrary Application Program. [Citation Graph (, )][DBLP]


  41. Database Intrusion Detection Using Role Profiling with Role Hierarchy. [Citation Graph (, )][DBLP]


  42. A Safe RSS Approach for Securely Sharing Mobile SVG Biomedical Images for Web 2.0. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.455secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002