|
Search the dblp DataBase
Catherine D. McCollum:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein
Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases. [Citation Graph (1, 0)][DBLP] DBSec, 1993, pp:109-121 [Conf]
- Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo
Beyond the Pale of MAC and DAC-Defining New Forms of Access Control. [Citation Graph (1, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:190-200 [Conf]
- Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
Application-Level Isolation Using Data Inconsistency Detection. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:119-0 [Conf]
- Sushil Jajodia, Peng Liu, Catherine D. McCollum
Application-Level Isolation to Cope with Malicious Database Users. [Citation Graph (0, 0)][DBLP] ACSAC, 1998, pp:73-82 [Conf]
- Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala
Multilevel Secure Transaction Processing: Status and Prospects. [Citation Graph (0, 0)][DBLP] DBSec, 1996, pp:79-98 [Conf]
- Peng Liu, Sushil Jajodia, Catherine D. McCollum
Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1999, pp:3-18 [Conf]
- Catherine D. McCollum
Panel Discussion: Security for Distributed Database Management Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1992, pp:143-148 [Conf]
- Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas
Distributed Object Technologies, Databases and Security. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:17-31 [Conf]
- Catherine D. McCollum, LouAnna Notargiacomo
Distributed Concurrency Control with Optional Data Replication. [Citation Graph (0, 0)][DBLP] DBSec, 1991, pp:149-172 [Conf]
- LouAnna Notargiacomo, Barbara T. Blaustein, Catherine D. McCollum
A Model of Integrity Separation of Duty for a Trusted DBMS. [Citation Graph (0, 0)][DBLP] DBSec, 1993, pp:237-256 [Conf]
- Barbara T. Blaustein, Catherine D. McCollum, LouAnna Notargiacomo, K. P. Smith, Richard D. Graubart
Autonomy and Confidentiality: Secure Federated Data Management. [Citation Graph (0, 0)][DBLP] NGITS, 1995, pp:0-0 [Conf]
- Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein
Surviving information warfare attacks on databases. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:164-174 [Conf]
- Sushil Jajodia, Catherine D. McCollum, Paul Ammann
Trusted Recovery. [Citation Graph (0, 2)][DBLP] Commun. ACM, 1999, v:42, n:7, pp:71-75 [Journal]
- Sushil Jajodia, Paul Ammann, Catherine D. McCollum
Surviving Information Warfare Attacks. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1999, v:32, n:4, pp:57-63 [Journal]
- Catherine D. McCollum, Arnon Rosenthal, Barbara T. Blaustein
Flexible Security Policies for Digital Libraries. [Citation Graph (0, 0)][DBLP] ACM Comput. Surv., 1996, v:28, n:4es, pp:110- [Journal]
- Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala
Multilevel Security Transaction Processing. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2001, v:9, n:3, pp:165-195 [Journal]
- Peng Liu, Sushil Jajodia, Catherine D. McCollum
Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2000, v:8, n:4, pp:- [Journal]
- LouAnna Notargiacomo, Barbara T. Blaustein, Catherine D. McCollum
Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1995, v:3, n:2/3, pp:207-230 [Journal]
- Arnon Rosenthal, Leonard J. Seligman, Catherine D. McCollum, Barbara T. Blaustein, Bhavani M. Thuraisingham, Edward Lafferty
Data Management Research at The MITRE Corporation. [Citation Graph (0, 0)][DBLP] SIGMOD Record, 1995, v:24, n:3, pp:77-82 [Journal]
Search in 0.003secs, Finished in 0.004secs
|