default search action
3. DBSec 1989: Monterey, California, USA
- David L. Spooner, Carl E. Landwehr:
Database Security, III: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989. North-Holland 1990, ISBN 0-444-88701-6
Case Study: Medical Information Systems
- T. C. Ting:
Application Information Security Semantics: A Case of Mental Health Delivery. DBSec 1989: 1-12 - Joachim Biskup:
Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. DBSec 1989: 13-23
Policy and Models
- John E. Dobson:
Conversation Structures as a Means of Specifying Security Policy. DBSec 1989: 25-39 - John Alexander McDermid, Ernest S. Hocking:
Security Policies for Integrated Project Support Environments. DBSec 1989: 41-74 - Tsau Young Lin, Larry Kerschberg, Robert P. Trueblood:
Security Algebras and Formal Models: Using Petri Net Theory. DBSec 1989: 75-96
Requirements and Methods
- Thomas H. Hinke:
DBMS Trusted Computing Base Taxonomy. DBSec 1989: 97-108 - Richard D. Graubart:
Comparing DBMS and Operating System Security Requirements - The Need for a Separate DBMS Security Criteria. DBSec 1989: 109-114 - Gary W. Smith:
Solving Multilevel Database Security Problems: Technology Is Not Enough. DBSec 1989: 115-125 - Catherine Meadows:
Constructing Containers Using a Multilevel Relational Data Model. DBSec 1989: 127-141
Integration of Security Considerations with DBMS Development
- Ravi S. Sandhu:
Mandatory Controls for Database Integrity. DBSec 1989: 143-150 - Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu:
A Layered TCB Implementation versus the Hinke-Schaefer Approach. DBSec 1989: 151-165 - Richard D. Graubart:
A Comparison of Three Secure DBMS Architectures. DBSec 1989: 167-190 - John R. Campbell:
An Interim Report on the Development of Secure Database Prototypes at the National Computer Security Center. DBSec 1989: 191-197
Security Problems for Extended Database Technologies
- Teresa F. Lunt:
Multilevel Security for Object-Oriented Database Systems. DBSec 1989: 199-209 - Thomas F. Keefe, Wei-Tek Tsai:
Prototyping the SODA Model. DBSec 1989: 211-235 - David A. Bonyun:
Using Exess as a Framework for Secure DBMSs. DBSec 1989: 237-255 - María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Security Policies in Object-Oriented Databases. DBSec 1989: 257-268
Audit
- Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley:
Audit Trail Organization in Relational Databases. DBSec 1989: 269-281 - Hilary H. Hosmer:
Handling Security Violations within an Integrity Lock DBMS. DBSec 1989: 283-292
Inference and Aggregation
- Tzong-An Su, Gultekin Özsoyoglu:
Multivalued Dependency Inferences in Multilevel Relational Database Systems. DBSec 1989: 293-300 - Simon R. Wiseman:
On the Problem of Security in Data Bases. DBSec 1989: 301-310 - Leoan J. Buczkowski:
Database Inference Controller. DBSec 1989: 311-322 - J. Thomas Haigh, Richard C. O'Brien, Paul D. Stachour, Dana L. Toups:
The LDV Approach to Database Security. DBSec 1989: 323-339
Assurance
- Richard A. Kemmerer:
Formal Specification of a Mental Health Delivery System. DBSec 1989: 341-351
Discussion Summary / Report
- Ravi S. Sandhu:
Discussion Summary. DBSec 1989: 353-365 - Marvin Schaefer, Brian Hubbard:
Report From IFIP Working Group 11.3, Database Management Security, Task Force on Technical Issues Relating to the TDI. DBSec 1989: 367-376 - Carl E. Landwehr:
Research Question List, Answers, and Revision. DBSec 1989: 377-394
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.