DBSec B

23 papers

YearTitle / Authors
1988Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987
Carl E. Landwehr
1987A Personal View of DBMS Security.
Frank Manola
1987A User-Role Based Data Security Approach.
T. C. Ting
1987DBMS Technology vs. Threats.
Thomas H. Hinke
1987Database Security Course Module.
David K. Hsiao
1987Database Security: Where are We?
Carl E. Landwehr
1987Discussion Notes and Revised Question List.
David K. Hsiao
1987Effects of Distributed System Technology on Database Security: A Survey.
Glenn H. MacEwen
1987Formal Specification and Verification Techniques for Secure Database Systems.
Richard A. Kemmerer
1987Inference Control Via Query Restriction Vs. Data Modification: A Perspective.
Norman S. Matloff
1987Integrity Versus Security in Multi-Level Secure Databases.
Catherine Meadows, Sushil Jajodia
1987Lessons Learned from Modeling a Secure Multilevel Relational Database System.
Dorothy E. Denning
1987Logging and Accountability in Database Management Systems.
David A. Bonyun
1987Modeling Datbase Security Requirements.
J. Thomas Haigh
1987Modelling and Controlling User Inference.
Lawrence H. Cox
1987Operational Assurance for a Trusted DBMS.
Rae K. Burns
1987Privacy Respecting Permissions and Rights.
Joachim Biskup
1987Relationships between database System and Operating System Security.
David L. Spooner
1987Role-Based Security in Data Base Management Systems.
Frederick H. Lochovsky, Carson C. Woo
1987Secure Database Development Methodologies.
Maria Grazia Fugini
1987Security and Databases: A Personal View.
John E. Dobson
1987Status of Trusted DBMS Implementations.
Michael W. Hale
1987The Allocation of Database Management System Security Responsibilities.
Ronda R. Henning