DBSec B

35 papers

YearTitle / Authors
2001Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000
Bhavani Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, Zahir Tari
2000A Configurable Security Architecture Prototype.
Alexandre Hardy, Martin S. Olivier
2000A Fair-exchange E-commerce Protocol with Automated Dispute Resolution.
Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy
2000Access Control Model in Object-Oriented Systems.
Keiji Izaki, Katsuya Tanaka, Makoto Takizawa
2000Active Access Control as High-Level Control.
Daniel Cvrcek
2000Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations.
Marc Donner, David Nochin, Dennis E. Shasha, Wendy Walasek
2000An Integrated Framework for Database Privacy Protection.
Liwu Chang, Ira S. Moskowitz
2000An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task.
Sejong Oh, Seog Park
2000Authentic Third-party Data Publication.
Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
2000Author-X: A Java-Based System for XML Data Protection.
Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, Marco Mesiti
2000Conference Key Agreement Protocol Using Oblivious Transfer.
Ari Moesriami Barmawi, Shingo Takada, Norihisa Doi
2000Confidentiality vs. Integrity in Secure Databases.
Adrian Spalka, Armin B. Cremers
2000Coordinating Policy for Federated Applications.
Ken Moody
2000Database Security 2000.
John R. Campbell
2000Database Security Integration using Role-Based Access Control.
Sylvia L. Osborn
2000Declarative Semantics of Belief Queries in MLS Deductive Databases.
Hasan M. Jamil
2000Discovery of Multi-Level Security Policies.
Christina Yip Chung, Michael Gertz, Karl N. Levitt
2000Distributed Policies for Data Management - Making Policies Mobile.
Susan Chapin, Donald B. Faatz, Sushil Jajodia
2000Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges.
Arnon Rosenthal, Edward Sciore
2000Identifying Security Holes in OLAP Applications.
Jürgen Steger, Holger Günzel, Andreas Bauer
2000Integrating Security Policies in Federated Database Systems.
Marta Oliva, Fèlix Saltor
2000Language Extensions for Programmable Security.
John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi
2000Panel.
Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold
2000Protecting Deductive Databases from Unauthorized Retrievals.
Steve Barker
2000Protecting File systems Against Corruption Using Checksums.
Daniel Barbará, Rajni Goel, Sushil Jajodia
2000Protecting Information when Access is Granted for Collaboration.
Gio Wiederhold
2000Protecting Privacy from Continuous High-resolution Satellite Surveillance.
Soon Ae Chun, Vijayalakshmi Atluri
2000Role-Based Security in a Distributed Resource Environment.
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr
2000Security Architecture of the Multimedia Mediator.
Christian Altenschmidt, Joachim Biskup, Yücel Karabulut
2000Simulation and Analysis of Cryptographic Protocols.
Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
2000Trust Management in Distributed Databases.
James Bret Michael, Leonard T. Gaines
2000Web Security and Privacy (Panel).
Bhavani Thuraisingham
2000WorkFlow Analyzed for Security and Privacy in using Databases.
Wouter Teepe, Reind P. van de Riet, Martin S. Olivier
2000Wrappers - a mechanism to support state-based authorisation in Web applications.
Martin S. Olivier, Ehud Gudes
2000XML Access Control Systems: A Component-Based Approach.
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati