default search action
13. DBSec 1999: Seattle, WA, USA
- Vijayalakshmi Atluri, John Hale:
Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA. IFIP Conference Proceedings 171, Kluwer 2000, ISBN 0-7923-7848-2
Intrusion Detection
- Peng Liu, Sushil Jajodia, Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18 - Anup K. Ghosh, Aaron Schwartzbard:
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. DBSec 1999: 19-32 - Ravi Mukkamala, Jason Gagnon, Sushil Jajodia:
Integrating Data Mining Techniques with Intrusion Detection Methods. DBSec 1999: 33-46
Role-Based Access Control
- Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta:
RBAC on the Web by Secure Cookies. DBSec 1999: 49-62 - Ioannis Mavridis, George Pangalos, Marie Khair:
eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features. DBSec 1999: 63-78 - Steven A. Demurjian, Y. He, T. C. Ting, M. Saba:
Software Agents for Role Based Security. DBSec 1999: 79-93
Critical Infrastructure Protection Panel
- William V. Maconachy, Thomas Harper, Donald G. Marks, Terry Mayfield:
Selected Topics in Infrastructure and Information Assurance (Panel). DBSec 1999: 97-113
Policy/Modeling
- Andrew Po-Jung Ho:
A Secret Splitting Method for Assuring the Confidentiality of Electronic Records. DBSec 1999: 117-125 - Joachim Biskup:
For Unknown Secrecies Refusal is Better than Lying. DBSec 1999: 127-141
Workflow Systems
- Savith Kandala, Ravi S. Sandhu:
Extending The BFA Workflow Authorization Model to Express Weighted Voting. DBSec 1999: 145-159 - Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz:
A Strategy for an MLS Workflow Management System. DBSec 1999: 161-174
Data Mining/Data Warehousing
- Tom Johnsten, Vijay V. Raghavan:
Impact of Decision-Region Based Classification Mining Algorithms on Database Security. DBSec 1999: 177-191 - Chris Clifton:
Protecting Against Data Mining through Samples. DBSec 1999: 193-207 - Arnon Rosenthal, Edward Sciore, Vinti Doshi:
Security Administration for Federations, Warehouses, and other Derived Data. DBSec 1999: 209-223
Intrusion Detection Panel
- T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin:
Panel on Intrusion Detection. DBSec 1999: 227-234
Multilevel Security
- Donald G. Marks:
Enforcing Integrity While Maintaining Secrecy. DBSec 1999: 237-251 - Adrian Spalka, Armin B. Cremers:
The Effect of Confidentiality on the Structure of Databases. DBSec 1999: 253-268
Temporal Authorization Models
- Steve Barker:
Temporal Authorization in the Simplified Event Calculus. DBSec 1999: 271-284 - Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:
Specifying and Computing Hierarchies of Temporal Authorizations. DBSec 1999: 285-300
Object-Oriented Databases
- Yasunori Ishihara, Toshiyuki Morita, Minoru Ito:
The Security Problem against Inference Attacks on Object-Oriented Databases. DBSec 1999: 303-316 - Yun Bai, Vijay Varadharajan:
A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. DBSec 1999: 317-330
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.