default search action
11. DBSec 1997: Lake Tahoe, California, USA
- Tsau Young Lin, Shelly Qian:
Database Securty XI: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA. IFIP Conference Proceedings 113, Chapman & Hall 1998, ISBN 0-412-82090-0
Novel Systems
- Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton:
Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16 - Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas:
Distributed Object Technologies, Databases and Security. DBSec 1997: 17-31
Distributed and Federated Systems
- Zahir Tari:
Designing Security Agents for the DOK Federated System. DBSec 1997: 35-59 - Gio Wiederhold, Michel Bilello, Chris Donahue:
Web Implementation of a Security Mediator for Medical Databases. DBSec 1997: 60-72 - Sang Hyuk Son, Craig Chaney:
Supporting the Requirements for Multilevel Secure and Real-Time Databases in Distributed Environments. DBSec 1997: 73-91
Object-Oriented Systems
- Elisa Bertino, Elena Ferrari:
A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. DBSec 1997: 95-109 - Masha Gendler-Fishman, Ehud Gudes:
Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. DBSec 1997: 110-133 - John Hale, Jody Threet, Sujeet Shenoi:
Capability-Based Primitives for Access Control in Object-Oriented Systems. DBSec 1997: 134-148
Work Flow
- Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino:
An Execution Model for Multilevel Seccure Workflows. DBSec 1997: 151-165 - Roshan K. Thomas, Ravi S. Sandhu:
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. DBSec 1997: 166-181 - Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195
Architectures and Systems
- Sushil Jajodia, Ravi Mukkamala, Indrajit Ray:
A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218 - John P. McDermott:
Replication Does Survive Information Warfare Attacks. DBSec 1997: 219-228 - Chanjung Park, Seog Park, Sang Hyuk Son:
Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems. DBSec 1997: 229-244
Role-Based Access Control
- Steven A. Demurjian, T. C. Ting, John A. Reisner:
Software Architectural Alternatives for User Role-Based Security Policies. DBSec 1997: 247-261 - Ravi S. Sandhu, Venkata Bhamidipati:
The URA97 Model for Role-Based User-Role Assignment. DBSec 1997: 262-275
Multilevel Security
- Kan Zhang:
IRI: A Quantitative Approach to Inference Analysis in Relational Databases. DBSec 1997: 279-290 - Adrian Spalka, Armin B. Cremers:
Structured Name-Spaces in Secure Databases. DBSec 1997: 291-306 - Tsau Young Lin, Xiaoling Zuo:
Multilevel Decision Logic: A Formalism for Rules Mining. DBSec 1997: 307-321
Policy Modeling
- Wolfgang Eßmayr, Günther Pernul, A Min Tjoa:
Access Controls by Object-Oriented Concepts. DBSec 1997: 325-340 - Elisa Bertino, Elena Ferrari:
Administration Policies in a Multipolicy Autorization System. DBSec 1997: 341-355 - Latanya Sweeney:
Datafly: A System for Providing Anonymity in Medical Data. DBSec 1997: 356-381
System Implementations
- M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi:
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. DBSec 1997: 385-388 - Gary Lorentz, S. Dangi, Dominic Jones, Paul Carpenter, Sujeet Shenoi:
Implementing Advanced Internet Search Engines. DBSec 1997: 389-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.